54
54
DEFAULT_EC2_REALM=' compute.internal'
55
55
echo " AWS region is NOT us-east-1, will use EC2 realm as compute.internal"
56
56
fi
57
- ranger_agents_certs_path =" ./ranger-agents"
57
+ ranger_plugin_certs_path =" ./ranger-agents"
58
58
solr_certs_path=" ./solr-client"
59
59
keystore_location=" ./ranger-plugin-keystore.jks"
60
60
keystore_alias=rangerplugin
@@ -63,8 +63,17 @@ truststore_location="./ranger-plugin-truststore.jks"
63
63
ranger_server_certs_path=" ./ranger-server"
64
64
truststore_password=" changeit"
65
65
truststore_ranger_server_alias=" rangeradmin"
66
- secret_mgr_ranger_private_key=" emr/rangerGAagentkey"
67
- secret_mgr_ranger_admin_cert=" emr/rangerGAservercert"
66
+ secret_mgr_ranger_plugin_private_key=" emr/rangerGAagentkey"
67
+ secret_mgr_ranger_plugin_cert=" emr/rangerPluginCert"
68
+ secret_mgr_ranger_admin_private_key=" emr/rangerServerPrivateKey"
69
+ secret_mgr_ranger_admin_server_cert=" emr/rangerGAservercert"
70
+ ranger_admin_server_private_key_exists=" false"
71
+ ranger_admin_server_cert_exists=" false"
72
+ ranger_plugin_private_key_exists=" false"
73
+ ranger_plugin_cert_exists=" false"
74
+ ranger_solr_cert_exists=" false"
75
+ ranger_solr_key_exists=" false"
76
+ ranger_solr_trust_store_exists=" false"
68
77
69
78
certs_subject=" /C=US/ST=TX/L=Dallas/O=EMR/OU=EMR/CN=*.$DEFAULT_EC2_REALM "
70
79
@@ -97,47 +106,42 @@ generate_certs emr-certs
97
106
98
107
# Generate KeyStore and TrustStore for the Ranger plugins
99
108
# Keystore
100
- openssl pkcs12 -export -in ${ranger_agents_certs_path } /certificateChain.pem -inkey ${ranger_agents_certs_path } /privateKey.pem -chain -CAfile ${ranger_agents_certs_path } /trustedCertificates.pem -name ${keystore_alias} -out ${ranger_agents_certs_path } /keystore.p12 -password pass:${keystore_password}
101
- keytool -importkeystore -deststorepass ${keystore_password} -destkeystore ${keystore_location} -srckeystore ${ranger_agents_certs_path } /keystore.p12 -srcstoretype PKCS12 -srcstorepass ${keystore_password} -noprompt
109
+ openssl pkcs12 -export -in ${ranger_plugin_certs_path } /certificateChain.pem -inkey ${ranger_plugin_certs_path } /privateKey.pem -chain -CAfile ${ranger_plugin_certs_path } /trustedCertificates.pem -name ${keystore_alias} -out ${ranger_plugin_certs_path } /keystore.p12 -password pass:${keystore_password}
110
+ keytool -importkeystore -deststorepass ${keystore_password} -destkeystore ${keystore_location} -srckeystore ${ranger_plugin_certs_path } /keystore.p12 -srcstoretype PKCS12 -srcstorepass ${keystore_password} -noprompt
102
111
103
112
# Truststore
104
113
rm -rf ${truststore_location}
105
114
keytool -import -file ${ranger_server_certs_path} /certificateChain.pem -alias ${truststore_ranger_server_alias} -keystore ${truststore_location} -storepass ${truststore_password} -noprompt
106
115
107
- ranger_private_key_exists=" false"
108
- ranger_admin_cert_exists=" false"
109
- ranger_plugin_cert_exists=" false"
110
- ranger_solr_cert_exists=" false"
111
- ranger_server_key_exists=" false"
112
- ranger_solr_key_exists=" false"
113
- ranger_solr_trust_store_exists=" false"
114
116
115
117
# Delete existing secrets
116
- if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_private_key } --region $AWS_REGION > /dev/null 2>&1 ); then
117
- if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_private_key } --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
118
- echo " ${secret_mgr_ranger_private_key } already exists. Will not delete and recreate"
119
- ranger_private_key_exists =" true"
118
+ if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_plugin_private_key } --region $AWS_REGION > /dev/null 2>&1 ); then
119
+ if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_plugin_private_key } --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
120
+ echo " ${secret_mgr_ranger_plugin_private_key } already exists. Will not delete and recreate"
121
+ ranger_plugin_private_key_exists =" true"
120
122
fi
121
123
fi
122
-
123
- if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_cert} --region $AWS_REGION > /dev/null 2>&1 ); then
124
- if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_cert} --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
125
- echo " ${secret_mgr_ranger_admin_cert} already exists. Will not delete and recreate"
126
- ranger_admin_cert_exists=" true"
124
+ if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_plugin_cert} --region $AWS_REGION > /dev/null 2>&1 ); then
125
+ if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_plugin_cert} --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
126
+ echo " ${secret_mgr_ranger_plugin_cert} already exists. Will not delete and recreate"
127
+ ranger_plugin_cert_exists=" true"
127
128
fi
128
129
fi
129
- if (aws secretsmanager describe-secret --secret-id emr/rangerServerPrivateKey --region $AWS_REGION > /dev/null 2>&1 ); then
130
- if [[ $( aws secretsmanager describe-secret --secret-id emr/rangerServerPrivateKey --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
131
- echo " emr/rangerServerPrivateKey already exists. Will not delete and recreate"
132
- ranger_server_key_exists=" true"
130
+
131
+ if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_private_key} --region $AWS_REGION > /dev/null 2>&1 ); then
132
+ if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_private_key} --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
133
+ echo " ${secret_mgr_ranger_admin_private_key} already exists. Will not delete and recreate"
134
+ ranger_admin_server_private_key_exists=" true"
133
135
fi
134
136
fi
135
- if (aws secretsmanager describe-secret --secret-id emr/rangerPluginCert --region $AWS_REGION > /dev/null 2>&1 ); then
136
- if [[ $( aws secretsmanager describe-secret --secret-id emr/rangerPluginCert --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
137
- echo " emr/rangerPluginCert already exists. Will not delete and recreate"
138
- ranger_plugin_cert_exists=" true"
137
+
138
+ if (aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_server_cert} --region $AWS_REGION > /dev/null 2>&1 ); then
139
+ if [[ $( aws secretsmanager describe-secret --secret-id ${secret_mgr_ranger_admin_server_cert} --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
140
+ echo " ${secret_mgr_ranger_admin_server_cert} already exists. Will not delete and recreate"
141
+ ranger_admin_server_cert_exists=" true"
139
142
fi
140
143
fi
144
+
141
145
if (aws secretsmanager describe-secret --secret-id emr/rangerSolrCert --region $AWS_REGION > /dev/null 2>&1 ); then
142
146
if [[ $( aws secretsmanager describe-secret --secret-id emr/rangerSolrCert --query " DeletedDate" --region $AWS_REGION ) == " null" ]]; then
143
147
echo " emr/rangerSolrCert already exists. Will not delete and recreate"
@@ -157,18 +161,16 @@ if (aws secretsmanager describe-secret --secret-id emr/rangerSolrTrustedCert --r
157
161
fi
158
162
fi
159
163
160
- if [ $ranger_private_key_exists == " false" ] && [ $ranger_admin_cert_exists == " false" ]; then
161
- aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_private_key } --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
162
- aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_admin_cert } --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
164
+ if [ $ranger_admin_server_private_key_exists == " false" ] && [ $ranger_admin_server_cert_exists == " false" ]; then
165
+ aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_admin_private_key } --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
166
+ aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_admin_server_cert } --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
163
167
164
168
# # Basic wait for delete to be complete
165
169
sleep 60
166
170
167
- cat ${ranger_agents_certs_path} /privateKey.pem ${ranger_agents_certs_path} /certificateChain.pem > ${ranger_agents_certs_path} /rangerGAagentKeyChain.pem
168
171
169
- aws secretsmanager create-secret --name ${secret_mgr_ranger_private_key} \
170
- --description " X509 Ranger Agent Private Key to be used by EMR Security Config" --secret-string file://${ranger_agents_certs_path} /rangerGAagentKeyChain.pem --region $AWS_REGION
171
- aws secretsmanager create-secret --name ${secret_mgr_ranger_admin_cert} \
172
+ aws secretsmanager create-secret --name ${secret_mgr_ranger_admin_private_key} --description " Ranger Server Private Key" --secret-string file://${ranger_server_certs_path} /privateKey.pem --region $AWS_REGION
173
+ aws secretsmanager create-secret --name ${secret_mgr_ranger_admin_server_cert} \
172
174
--description " Ranger Server Cert" --secret-string file://${ranger_server_certs_path} /certificateChain.pem --region $AWS_REGION
173
175
174
176
if [[ $COPY_CERT_TO_LOCAL_S3_BUCKET == " true" ]]; then
179
181
180
182
# # Others that will be used by the Ranger Admin Server
181
183
182
- if [ $ranger_server_key_exists == " false" ] && [ $ranger_plugin_cert_exists == " false" ]; then
183
- aws secretsmanager delete-secret --secret-id emr/rangerServerPrivateKey --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
184
- aws secretsmanager delete-secret --secret-id emr/rangerPluginCert --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
184
+ if [ $ranger_plugin_private_key_exists == " false" ] && [ $ranger_plugin_cert_exists == " false" ]; then
185
+ aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_plugin_private_key} --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
186
+ aws secretsmanager delete-secret --secret-id ${secret_mgr_ranger_plugin_cert} --force-delete-without-recovery --region $AWS_REGION --cli-read-timeout 10 --cli-connect-timeout 10
185
187
186
188
sleep 60
187
- aws secretsmanager create-secret --name emr/rangerServerPrivateKey --description " Ranger Server Private Key" --secret-string file://${ranger_server_certs_path} /privateKey.pem --region $AWS_REGION
188
- aws secretsmanager create-secret --name emr/rangerPluginCert --description " Ranger Plugin Cert" --secret-string file://${ranger_agents_certs_path} /certificateChain.pem --region $AWS_REGION
189
+ cat ${ranger_plugin_certs_path} /privateKey.pem ${ranger_plugin_certs_path} /certificateChain.pem > ${ranger_plugin_certs_path} /rangerGAagentKeyChain.pem
190
+ aws secretsmanager create-secret --name ${secret_mgr_ranger_plugin_private_key} \
191
+ --description " X509 Ranger Agent Private Key to be used by EMR Security Config" --secret-string file://${ranger_plugin_certs_path} /rangerGAagentKeyChain.pem --region $AWS_REGION
192
+ aws secretsmanager create-secret --name ${secret_mgr_ranger_plugin_cert} --description " Ranger Plugin Cert" --secret-string file://${ranger_plugin_certs_path} /certificateChain.pem --region $AWS_REGION
189
193
190
194
fi
191
195
0 commit comments