provider.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package ibm
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "strings"
  18. "time"
  19. "github.com/IBM/go-sdk-core/v5/core"
  20. sm "github.com/IBM/secrets-manager-go-sdk/secretsmanagerv1"
  21. corev1 "k8s.io/api/core/v1"
  22. "k8s.io/apimachinery/pkg/types"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. "github.com/tidwall/gjson"
  28. )
  29. const (
  30. SecretsManagerEndpointEnv = "IBM_SECRETSMANAGER_ENDPOINT"
  31. STSEndpointEnv = "IBM_STS_ENDPOINT"
  32. SSMEndpointEnv = "IBM_SSM_ENDPOINT"
  33. errIBMClient = "cannot setup new ibm client: %w"
  34. errIBMCredSecretName = "invalid IBM SecretStore resource: missing IBM APIKey"
  35. errUninitalizedIBMProvider = "provider IBM is not initialized"
  36. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  37. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  38. errMissingSAK = "missing SecretAccessKey"
  39. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  40. )
  41. type SecretManagerClient interface {
  42. GetSecret(getSecretOptions *sm.GetSecretOptions) (result *sm.GetSecret, response *core.DetailedResponse, err error)
  43. }
  44. type providerIBM struct {
  45. IBMClient SecretManagerClient
  46. }
  47. type client struct {
  48. kube kclient.Client
  49. store *esv1beta1.IBMProvider
  50. namespace string
  51. storeKind string
  52. credentials []byte
  53. }
  54. var log = ctrl.Log.WithName("provider").WithName("ibm").WithName("secretsmanager")
  55. func (c *client) setAuth(ctx context.Context) error {
  56. credentialsSecret := &corev1.Secret{}
  57. credentialsSecretName := c.store.Auth.SecretRef.SecretAPIKey.Name
  58. if credentialsSecretName == "" {
  59. return fmt.Errorf(errIBMCredSecretName)
  60. }
  61. objectKey := types.NamespacedName{
  62. Name: credentialsSecretName,
  63. Namespace: c.namespace,
  64. }
  65. // only ClusterStore is allowed to set namespace (and then it's required)
  66. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  67. if c.store.Auth.SecretRef.SecretAPIKey.Namespace == nil {
  68. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  69. }
  70. objectKey.Namespace = *c.store.Auth.SecretRef.SecretAPIKey.Namespace
  71. }
  72. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  73. if err != nil {
  74. return fmt.Errorf(errFetchSAKSecret, err)
  75. }
  76. c.credentials = credentialsSecret.Data[c.store.Auth.SecretRef.SecretAPIKey.Key]
  77. if (c.credentials == nil) || (len(c.credentials) == 0) {
  78. return fmt.Errorf(errMissingSAK)
  79. }
  80. return nil
  81. }
  82. // Empty GetAllSecrets.
  83. func (ibm *providerIBM) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  84. // TO be implemented
  85. return nil, fmt.Errorf("GetAllSecrets not implemented")
  86. }
  87. func (ibm *providerIBM) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  88. if utils.IsNil(ibm.IBMClient) {
  89. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  90. }
  91. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  92. secretName := ref.Key
  93. nameSplitted := strings.Split(secretName, "/")
  94. if len(nameSplitted) > 1 {
  95. secretType = nameSplitted[0]
  96. secretName = nameSplitted[1]
  97. }
  98. switch secretType {
  99. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  100. return getArbitrarySecret(ibm, &secretName)
  101. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  102. if ref.Property == "" {
  103. return nil, fmt.Errorf("remoteRef.property required for secret type username_password")
  104. }
  105. return getUsernamePasswordSecret(ibm, &secretName, ref)
  106. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  107. return getIamCredentialsSecret(ibm, &secretName)
  108. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  109. if ref.Property == "" {
  110. return nil, fmt.Errorf("remoteRef.property required for secret type imported_cert")
  111. }
  112. return getImportCertSecret(ibm, &secretName, ref)
  113. case sm.CreateSecretOptionsSecretTypeKvConst:
  114. if ref.Property == "" {
  115. return nil, fmt.Errorf("remoteRef.property required for secret type kv")
  116. }
  117. return getKVSecret(ibm, &secretName, ref)
  118. default:
  119. return nil, fmt.Errorf("unknown secret type %s", secretType)
  120. }
  121. }
  122. func getArbitrarySecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  123. response, _, err := ibm.IBMClient.GetSecret(
  124. &sm.GetSecretOptions{
  125. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  126. ID: secretName,
  127. })
  128. if err != nil {
  129. return nil, err
  130. }
  131. secret := response.Resources[0].(*sm.SecretResource)
  132. secretData := secret.SecretData.(map[string]interface{})
  133. arbitrarySecretPayload := secretData["payload"].(string)
  134. return []byte(arbitrarySecretPayload), nil
  135. }
  136. func getImportCertSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  137. response, _, err := ibm.IBMClient.GetSecret(
  138. &sm.GetSecretOptions{
  139. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  140. ID: secretName,
  141. })
  142. if err != nil {
  143. return nil, err
  144. }
  145. secret := response.Resources[0].(*sm.SecretResource)
  146. secretData := secret.SecretData.(map[string]interface{})
  147. if val, ok := secretData[ref.Property]; ok {
  148. return []byte(val.(string)), nil
  149. }
  150. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  151. }
  152. func getIamCredentialsSecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  153. response, _, err := ibm.IBMClient.GetSecret(
  154. &sm.GetSecretOptions{
  155. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  156. ID: secretName,
  157. })
  158. if err != nil {
  159. return nil, err
  160. }
  161. secret := response.Resources[0].(*sm.SecretResource)
  162. secretData := *secret.APIKey
  163. return []byte(secretData), nil
  164. }
  165. func getUsernamePasswordSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  166. response, _, err := ibm.IBMClient.GetSecret(
  167. &sm.GetSecretOptions{
  168. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  169. ID: secretName,
  170. })
  171. if err != nil {
  172. return nil, err
  173. }
  174. secret := response.Resources[0].(*sm.SecretResource)
  175. secretData := secret.SecretData.(map[string]interface{})
  176. if val, ok := secretData[ref.Property]; ok {
  177. return []byte(val.(string)), nil
  178. }
  179. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  180. }
  181. // Returns a secret of type kv and supports json path.
  182. func getKVSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  183. secret, err := getSecretByType(ibm, secretName, sm.CreateSecretOptionsSecretTypeKvConst)
  184. if err != nil {
  185. return nil, err
  186. }
  187. log.Info("getKVSecret", "secretName", secretName)
  188. secretData := secret.SecretData.(map[string]interface{})
  189. payload, ok := secretData["payload"]
  190. if !ok {
  191. return nil, fmt.Errorf("no payload returned for secret %s", ref.Key)
  192. }
  193. payloadJSON := payload
  194. payloadJSONMap, ok := payloadJSON.(map[string]interface{})
  195. if ok {
  196. var payloadJSONByte []byte
  197. payloadJSONByte, err = json.Marshal(payloadJSONMap)
  198. payloadJSON = string(payloadJSONByte)
  199. }
  200. if ref.Property != "" {
  201. val := gjson.Get(payloadJSON.(string), ref.Property)
  202. if !val.Exists() {
  203. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  204. }
  205. return []byte(val.String()), nil
  206. }
  207. return nil, fmt.Errorf("no property provided for secret %s", ref.Key)
  208. }
  209. func getSecretByType(ibm *providerIBM, secretName *string, secretType string) (*sm.SecretResource, error) {
  210. response, _, err := ibm.IBMClient.GetSecret(
  211. &sm.GetSecretOptions{
  212. SecretType: core.StringPtr(secretType),
  213. ID: secretName,
  214. })
  215. if err != nil {
  216. return nil, err
  217. }
  218. secret := response.Resources[0].(*sm.SecretResource)
  219. return secret, nil
  220. }
  221. func (ibm *providerIBM) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  222. if utils.IsNil(ibm.IBMClient) {
  223. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  224. }
  225. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  226. secretName := ref.Key
  227. nameSplitted := strings.Split(secretName, "/")
  228. if len(nameSplitted) > 1 {
  229. secretType = nameSplitted[0]
  230. secretName = nameSplitted[1]
  231. }
  232. switch secretType {
  233. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  234. response, _, err := ibm.IBMClient.GetSecret(
  235. &sm.GetSecretOptions{
  236. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  237. ID: &ref.Key,
  238. })
  239. if err != nil {
  240. return nil, err
  241. }
  242. secret := response.Resources[0].(*sm.SecretResource)
  243. secretData := secret.SecretData.(map[string]interface{})
  244. arbitrarySecretPayload := secretData["payload"].(string)
  245. kv := make(map[string]interface{})
  246. err = json.Unmarshal([]byte(arbitrarySecretPayload), &kv)
  247. if err != nil {
  248. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  249. }
  250. secretMap := byteArrayMap(kv)
  251. return secretMap, nil
  252. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  253. response, _, err := ibm.IBMClient.GetSecret(
  254. &sm.GetSecretOptions{
  255. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  256. ID: &secretName,
  257. })
  258. if err != nil {
  259. return nil, err
  260. }
  261. secret := response.Resources[0].(*sm.SecretResource)
  262. secretData := secret.SecretData.(map[string]interface{})
  263. secretMap := byteArrayMap(secretData)
  264. return secretMap, nil
  265. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  266. response, _, err := ibm.IBMClient.GetSecret(
  267. &sm.GetSecretOptions{
  268. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  269. ID: &secretName,
  270. })
  271. if err != nil {
  272. return nil, err
  273. }
  274. secret := response.Resources[0].(*sm.SecretResource)
  275. secretData := *secret.APIKey
  276. secretMap := make(map[string][]byte)
  277. secretMap["apikey"] = []byte(secretData)
  278. return secretMap, nil
  279. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  280. response, _, err := ibm.IBMClient.GetSecret(
  281. &sm.GetSecretOptions{
  282. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  283. ID: &secretName,
  284. })
  285. if err != nil {
  286. return nil, err
  287. }
  288. secret := response.Resources[0].(*sm.SecretResource)
  289. secretData := secret.SecretData.(map[string]interface{})
  290. secretMap := byteArrayMap(secretData)
  291. return secretMap, nil
  292. case sm.CreateSecretOptionsSecretTypeKvConst:
  293. secret, err := getSecretByType(ibm, &secretName, sm.CreateSecretOptionsSecretTypeKvConst)
  294. if err != nil {
  295. return nil, err
  296. }
  297. secretData := secret.SecretData.(map[string]interface{})
  298. secretPayload := secretData["payload"].(string)
  299. kv := make(map[string]interface{})
  300. err = json.Unmarshal([]byte(secretPayload), &kv)
  301. if err != nil {
  302. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  303. }
  304. secretMap := byteArrayMap(kv)
  305. return secretMap, nil
  306. default:
  307. return nil, fmt.Errorf("unknown secret type %s", secretType)
  308. }
  309. }
  310. func byteArrayMap(secretData map[string]interface{}) map[string][]byte {
  311. secretMap := make(map[string][]byte)
  312. for k, v := range secretData {
  313. secretMap[k] = []byte(v.(string))
  314. }
  315. return secretMap
  316. }
  317. func (ibm *providerIBM) Close(ctx context.Context) error {
  318. return nil
  319. }
  320. func (ibm *providerIBM) Validate() error {
  321. return nil
  322. }
  323. func (ibm *providerIBM) ValidateStore(store esv1beta1.GenericStore) error {
  324. return nil
  325. }
  326. func (ibm *providerIBM) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  327. storeSpec := store.GetSpec()
  328. ibmSpec := storeSpec.Provider.IBM
  329. iStore := &client{
  330. kube: kube,
  331. store: ibmSpec,
  332. namespace: namespace,
  333. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  334. }
  335. if err := iStore.setAuth(ctx); err != nil {
  336. return nil, err
  337. }
  338. secretsManager, err := sm.NewSecretsManagerV1(&sm.SecretsManagerV1Options{
  339. URL: *storeSpec.Provider.IBM.ServiceURL,
  340. Authenticator: &core.IamAuthenticator{
  341. ApiKey: string(iStore.credentials),
  342. },
  343. })
  344. // Setup retry options, but only if present
  345. if storeSpec.RetrySettings != nil {
  346. var retryAmount int
  347. var retryDuration time.Duration
  348. if storeSpec.RetrySettings.MaxRetries != nil {
  349. retryAmount = int(*storeSpec.RetrySettings.MaxRetries)
  350. } else {
  351. retryAmount = 3
  352. }
  353. if storeSpec.RetrySettings.RetryInterval != nil {
  354. retryDuration, err = time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  355. } else {
  356. retryDuration = 5 * time.Second
  357. }
  358. if err == nil {
  359. secretsManager.Service.EnableRetries(retryAmount, retryDuration)
  360. }
  361. }
  362. if err != nil {
  363. return nil, fmt.Errorf(errIBMClient, err)
  364. }
  365. ibm.IBMClient = secretsManager
  366. return ibm, nil
  367. }
  368. func init() {
  369. esv1beta1.Register(&providerIBM{}, &esv1beta1.SecretStoreProvider{
  370. IBM: &esv1beta1.IBMProvider{},
  371. })
  372. }