|
| 1 | +#!/usr/bin/env bash |
| 2 | + |
| 3 | +# |
| 4 | +# This script apply follow naming role: |
| 5 | +# for a principal, i.e. ranger-admin, its: |
| 6 | +# 1. private key: ranger-admin.key |
| 7 | +# 2. certificate: ranger-admin.crt |
| 8 | +# 3. pcks12 file: ranger-admin.p12 |
| 9 | +# 4. keystore: ranger-admin-keystore.jks |
| 10 | +# 5. truststore: ranger-admin-truststore.jks |
| 11 | +# |
| 12 | + |
| 13 | +createRangerSecrets() { |
| 14 | + printHeading "CREATE KEY, CRT, KEYSTORE & TRUSTSTORE FOR RANGER" |
| 15 | + |
| 16 | + rm -rf $RANGER_SECRETS_DIR |
| 17 | + mkdir -p $RANGER_SECRETS_DIR |
| 18 | + |
| 19 | + # ranger-admin |
| 20 | + printHeading "CREATE KEY, CRT, KEYSTORE FOR [ ranger-admin ]" |
| 21 | + createKeyCertPair "ranger-admin" |
| 22 | + createKeystore "ranger-admin" |
| 23 | + |
| 24 | + # ranger-plugin |
| 25 | + # it is NOT possible to use ranger-plugin certs, because they will be generated & managed by EMR |
| 26 | + # but for other open-source plugins, i.e. HBase, Presto, these certs will be required if ranger admin https enabled! |
| 27 | + printHeading "CREATE KEY, CRT, KEYSTORE FOR [ ranger-plugin ]" |
| 28 | + createKeyCertPair "ranger-plugin" |
| 29 | + createKeystore "ranger-plugin" |
| 30 | + |
| 31 | + # build truststore file used by ranger admin, be careful, this file NOT USED! |
| 32 | + # instead, plugins crts will install to JVM cacerts file. |
| 33 | + createOrImportToTruststore "ranger-admin" "ranger-admin"# trust self |
| 34 | + createOrImportToTruststore "ranger-admin" "ranger-plugin" # trust plugin |
| 35 | + |
| 36 | + # build truststore file used by ranger open-source plugins. |
| 37 | + # for emr-native plugins, EMR will regenerate truststore with key & certs from secrets manager. |
| 38 | + createOrImportToTruststore "ranger-plugin" "ranger-plugin" # trust self |
| 39 | + createOrImportToTruststore "ranger-plugin" "ranger-admin" # trust admin |
| 40 | + |
| 41 | + # NOTE: because there is explicit truststore config items in ranger admin, |
| 42 | + # there is no way to set the path of 'ranger-admin-truststore.jks', |
| 43 | + # so, we HAVE TO add all trusted crts to JAVA default crts store: $JAVA_HOME/jre/lib/security/cacerts |
| 44 | + removeFromJavaDefaultTruststore "ranger-admin" |
| 45 | + importToJavaDefaultTruststore "ranger-admin" # trust self |
| 46 | + removeFromJavaDefaultTruststore "ranger-plugin" |
| 47 | + importToJavaDefaultTruststore "ranger-plugin" # trust self |
| 48 | + |
| 49 | + listCerts "ranger-admin" |
| 50 | + listCerts "ranger-plugin" |
| 51 | + |
| 52 | + removeSecretsOnSecretsManager |
| 53 | + uploadRangerSecretsToSecretsManager |
| 54 | +} |
| 55 | + |
| 56 | +removeRangerSecrets() { |
| 57 | + removeSecretsOnSecretsManager |
| 58 | + removeFromJavaDefaultTruststore "ranger-admin" |
| 59 | + removeFromJavaDefaultTruststore "ranger-plugin" |
| 60 | + rm -rf $RANGER_SECRETS_DIR |
| 61 | +} |
| 62 | + |
| 63 | +createKeyCertPair() { |
| 64 | + principal="$1" |
| 65 | + openssl req -x509 -newkey rsa:2048 -nodes -keyout $RANGER_SECRETS_DIR/${principal}.key -out $RANGER_SECRETS_DIR/${principal}.crt -days 3650 -subj "/C=CN/ST=SHANGHAI/L=SHANGHAI/O=EXAMPLE/OU=IT/CN=$CERTIFICATE_CN" |
| 66 | +} |
| 67 | + |
| 68 | +createKeystore() { |
| 69 | + principal="$1" |
| 70 | + openssl pkcs12 -export -in $RANGER_SECRETS_DIR/${principal}.crt -inkey $RANGER_SECRETS_DIR/${principal}.key -chain -CAfile $RANGER_SECRETS_DIR/${principal}.crt -name ${principal} -out $RANGER_SECRETS_DIR/${principal}.p12 -password pass:changeit |
| 71 | + keytool -importkeystore -deststorepass changeit -destkeystore $RANGER_SECRETS_DIR/${principal}-keystore.jks -srckeystore $RANGER_SECRETS_DIR/${principal}.p12 -srcstoretype PKCS12 -srcstorepass changeit |
| 72 | +} |
| 73 | + |
| 74 | +createOrImportToTruststore() { |
| 75 | + trustingPrincipal="$1" |
| 76 | + trustedPrincipal="$2" |
| 77 | + keytool -import -file $RANGER_SECRETS_DIR/${trustedPrincipal}.crt -alias $trustedPrincipal -keystore $RANGER_SECRETS_DIR/${trustingPrincipal}-truststore.jks -storepass changeit -noprompt |
| 78 | +} |
| 79 | + |
| 80 | +removeFromJavaDefaultTruststore() { |
| 81 | + trustedPrincipal="$1" |
| 82 | + keytool -delete -alias $trustedPrincipal -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit |
| 83 | +} |
| 84 | + |
| 85 | +importToJavaDefaultTruststore() { |
| 86 | + trustedPrincipal="$1" |
| 87 | + keytool -import -file $RANGER_SECRETS_DIR/${trustedPrincipal}.crt -alias $trustedPrincipal -keystore $JAVA_HOME/jre/lib/security/cacerts -storepass changeit -noprompt |
| 88 | +} |
| 89 | + |
| 90 | +listCerts() { |
| 91 | + principal="$1" |
| 92 | + echo "${principal}-keystore.jks contains following certificates:" |
| 93 | + keytool -list -v -keystore $RANGER_SECRETS_DIR/${principal}-keystore.jks -storepass changeit|grep Alias.* |
| 94 | + echo "${principal}-truststore.jks contains following certificates:" |
| 95 | + keytool -list -v -keystore $RANGER_SECRETS_DIR/${principal}-truststore.jks -storepass changeit|grep Alias.* |
| 96 | +} |
| 97 | + |
| 98 | +uploadRangerSecretsToSecretsManager() { |
| 99 | + printHeading "UPLOAD SECRETS TO SECRETSMANAGER" |
| 100 | + # append postfix for secret id in case there are multiple clusters to be created! |
| 101 | + aws secretsmanager create-secret --name "ranger-admin@${RANGER_HOST}" --description "Ranger Admin Certificate" --secret-string file://$RANGER_SECRETS_DIR/ranger-admin.crt --region $REGION |
| 102 | + # EMR Security Configuration need a secret file contains plugin key and cert both. |
| 103 | + cat $RANGER_SECRETS_DIR/ranger-plugin.key $RANGER_SECRETS_DIR/ranger-plugin.crt > $RANGER_SECRETS_DIR/ranger-plugin.key+crt |
| 104 | + aws secretsmanager create-secret --name "ranger-plugin@${RANGER_HOST}" --description "Ranger Admin Private Key & Certificate" --secret-string file://$RANGER_SECRETS_DIR/ranger-plugin.key+crt --region $REGION |
| 105 | +} |
| 106 | + |
| 107 | +removeSecretsOnSecretsManager() { |
| 108 | + printHeading "REMOVE SECRETS FROM SECRETSMANAGER" |
| 109 | + aws secretsmanager delete-secret --secret-id "ranger-admin@${RANGER_HOST}" --force-delete-without-recovery --region $REGION --cli-read-timeout 10 --cli-connect-timeout 10 |
| 110 | + aws secretsmanager delete-secret --secret-id "ranger-plugin@${RANGER_HOST}" --force-delete-without-recovery --region $REGION --cli-read-timeout 10 --cli-connect-timeout 10 |
| 111 | + |
| 112 | + # deleting secrets is async job, have to wait for a while... |
| 113 | + sleep 30 |
| 114 | +} |
| 115 | + |
0 commit comments