oracle.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "context"
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "github.com/oracle/oci-go-sdk/v56/common"
  19. "github.com/oracle/oci-go-sdk/v56/common/auth"
  20. "github.com/oracle/oci-go-sdk/v56/secrets"
  21. "github.com/tidwall/gjson"
  22. corev1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/types"
  24. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  25. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  26. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  27. "github.com/external-secrets/external-secrets/pkg/provider"
  28. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  29. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. )
  32. const (
  33. VaultEndpointEnv = "ORACLE_VAULT_ENDPOINT"
  34. STSEndpointEnv = "ORACLE_STS_ENDPOINT"
  35. SVMEndpointEnv = "ORACLE_SVM_ENDPOINT"
  36. errOracleClient = "cannot setup new oracle client: %w"
  37. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  38. errUninitalizedOracleProvider = "provider oracle is not initialized"
  39. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  40. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  41. errMissingPK = "missing PrivateKey"
  42. errMissingUser = "missing User ID"
  43. errMissingTenancy = "missing Tenancy ID"
  44. errMissingRegion = "missing Region"
  45. errMissingFingerprint = "missing Fingerprint"
  46. errMissingVault = "missing Vault"
  47. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  48. errMissingKey = "missing Key in secret: %s"
  49. errUnexpectedContent = "unexpected secret bundle content"
  50. )
  51. type VaultManagementService struct {
  52. Client VMInterface
  53. vault string
  54. }
  55. type VMInterface interface {
  56. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  57. }
  58. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  59. if utils.IsNil(vms.Client) {
  60. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  61. }
  62. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  63. VaultId: &vms.vault,
  64. SecretName: &ref.Key,
  65. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  66. })
  67. if err != nil {
  68. return nil, util.SanitizeErr(err)
  69. }
  70. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  71. if !ok {
  72. return nil, fmt.Errorf(errUnexpectedContent)
  73. }
  74. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  75. if err != nil {
  76. return nil, err
  77. }
  78. if ref.Property == "" {
  79. return payload, nil
  80. }
  81. val := gjson.Get(string(payload), ref.Property)
  82. if !val.Exists() {
  83. return nil, fmt.Errorf(errMissingKey, ref.Key)
  84. }
  85. return []byte(val.String()), nil
  86. }
  87. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  88. data, err := vms.GetSecret(ctx, ref)
  89. if err != nil {
  90. return nil, err
  91. }
  92. kv := make(map[string]string)
  93. err = json.Unmarshal(data, &kv)
  94. if err != nil {
  95. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  96. }
  97. secretData := make(map[string][]byte)
  98. for k, v := range kv {
  99. secretData[k] = []byte(v)
  100. }
  101. return secretData, nil
  102. }
  103. // NewClient constructs a new secrets client based on the provided store.
  104. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  105. storeSpec := store.GetSpec()
  106. oracleSpec := storeSpec.Provider.Oracle
  107. if oracleSpec.Vault == "" {
  108. return nil, fmt.Errorf(errMissingVault)
  109. }
  110. if oracleSpec.Region == "" {
  111. return nil, fmt.Errorf(errMissingRegion)
  112. }
  113. var (
  114. err error
  115. configurationProvider common.ConfigurationProvider
  116. )
  117. if oracleSpec.Auth == nil {
  118. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  119. } else {
  120. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  121. }
  122. if err != nil {
  123. return nil, fmt.Errorf(errOracleClient, err)
  124. }
  125. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  126. if err != nil {
  127. return nil, fmt.Errorf(errOracleClient, err)
  128. }
  129. secretManagementService.SetRegion(oracleSpec.Region)
  130. return &VaultManagementService{
  131. Client: secretManagementService,
  132. vault: oracleSpec.Vault,
  133. }, nil
  134. }
  135. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  136. if secretRef.Name == "" {
  137. return "", fmt.Errorf(errORACLECredSecretName)
  138. }
  139. objectKey := types.NamespacedName{
  140. Name: secretRef.Name,
  141. Namespace: namespace,
  142. }
  143. // only ClusterStore is allowed to set namespace (and then it's required)
  144. if storeKind == esv1alpha1.ClusterSecretStoreKind {
  145. if secretRef.Namespace == nil {
  146. return "", fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  147. }
  148. objectKey.Namespace = *secretRef.Namespace
  149. }
  150. secret := corev1.Secret{}
  151. err := kube.Get(ctx, objectKey, &secret)
  152. if err != nil {
  153. return "", fmt.Errorf(errFetchSAKSecret, err)
  154. }
  155. return string(secret.Data[secretRef.Key]), nil
  156. }
  157. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1alpha1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  158. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  159. if err != nil {
  160. return nil, err
  161. }
  162. if privateKey == "" {
  163. return nil, fmt.Errorf(errMissingPK)
  164. }
  165. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  166. if err != nil {
  167. return nil, err
  168. }
  169. if fingerprint == "" {
  170. return nil, fmt.Errorf(errMissingFingerprint)
  171. }
  172. if store.Auth.User == "" {
  173. return nil, fmt.Errorf(errMissingUser)
  174. }
  175. if store.Auth.Tenancy == "" {
  176. return nil, fmt.Errorf(errMissingTenancy)
  177. }
  178. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  179. }
  180. func (vms *VaultManagementService) Close(ctx context.Context) error {
  181. return nil
  182. }
  183. func (vms *VaultManagementService) Validate() error {
  184. return nil
  185. }
  186. func init() {
  187. schema.Register(&VaultManagementService{}, &esv1alpha1.SecretStoreProvider{
  188. Oracle: &esv1alpha1.OracleProvider{},
  189. })
  190. }