csm_client.go 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package adapter provides the adapter implementation for CloudRU Secret Manager.
  14. package adapter
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "sync"
  20. "time"
  21. iamAuthV1 "github.com/cloudru-tech/iam-sdk/api/auth/v1"
  22. smssdk "github.com/cloudru-tech/secret-manager-sdk"
  23. smsV1 "github.com/cloudru-tech/secret-manager-sdk/api/v1"
  24. smsV2 "github.com/cloudru-tech/secret-manager-sdk/api/v2"
  25. "google.golang.org/grpc/codes"
  26. "google.golang.org/grpc/metadata"
  27. "google.golang.org/grpc/status"
  28. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  29. )
  30. const errUnauthorized = "unauthorized: %w"
  31. // CredentialsResolver returns the actual client credentials.
  32. type CredentialsResolver interface {
  33. Resolve(ctx context.Context) (*Credentials, error)
  34. }
  35. // APIClient - Cloudru Secret Manager Service Client.
  36. type APIClient struct {
  37. cr CredentialsResolver
  38. iamClient iamAuthV1.AuthServiceClient
  39. smsClient *smssdk.Client
  40. mu sync.Mutex
  41. accessToken string
  42. accessTokenExpiresAt time.Time
  43. }
  44. // ListSecretsRequest is a request to list secrets.
  45. type ListSecretsRequest struct {
  46. ProjectID string
  47. Labels map[string]string
  48. NameExact string
  49. NameRegex string
  50. Path string
  51. }
  52. // Credentials holds the keyID and secret for the CSM client.
  53. type Credentials struct {
  54. KeyID string
  55. Secret string
  56. }
  57. // NewCredentials creates a new Credentials object.
  58. func NewCredentials(kid, secret string) (*Credentials, error) {
  59. if kid == "" || secret == "" {
  60. return nil, errors.New("keyID and secret must be provided")
  61. }
  62. return &Credentials{KeyID: kid, Secret: secret}, nil
  63. }
  64. // NewAPIClient creates a new grpc SecretManager client.
  65. func NewAPIClient(cr CredentialsResolver, iamClient iamAuthV1.AuthServiceClient, client *smssdk.Client) *APIClient {
  66. return &APIClient{
  67. cr: cr,
  68. iamClient: iamClient,
  69. smsClient: client,
  70. }
  71. }
  72. // ListSecrets retrieves a list of secrets from CloudRU Secret Manager.
  73. func (c *APIClient) ListSecrets(ctx context.Context, req *ListSecretsRequest) ([]*smsV2.Secret, error) {
  74. searchReq := &smsV2.SearchSecretRequest{
  75. ProjectId: req.ProjectID,
  76. Labels: req.Labels,
  77. Depth: -1,
  78. }
  79. switch {
  80. case req.NameExact != "":
  81. searchReq.Name = &smsV2.SearchSecretRequest_Exact{Exact: req.NameExact}
  82. case req.NameRegex != "":
  83. searchReq.Name = &smsV2.SearchSecretRequest_Regex{Regex: req.NameRegex}
  84. }
  85. if req.Path != "" {
  86. searchReq.Path = req.Path
  87. }
  88. var err error
  89. ctx, err = c.authCtx(ctx)
  90. if err != nil {
  91. return nil, fmt.Errorf(errUnauthorized, err)
  92. }
  93. resp, err := c.smsClient.V2.SecretService.Search(ctx, searchReq)
  94. if err != nil {
  95. return nil, err
  96. }
  97. return resp.Secrets, nil
  98. }
  99. // AccessSecretVersionByPath retrieves a secret version by its path from CloudRU Secret Manager.
  100. func (c *APIClient) AccessSecretVersionByPath(ctx context.Context, projectID, path string, version *int32) ([]byte, error) {
  101. var err error
  102. ctx, err = c.authCtx(ctx)
  103. if err != nil {
  104. return nil, fmt.Errorf(errUnauthorized, err)
  105. }
  106. req := &smsV2.AccessSecretRequest{
  107. ProjectId: projectID,
  108. Path: path,
  109. Version: version,
  110. }
  111. secret, err := c.smsClient.V2.SecretService.Access(ctx, req)
  112. if err != nil {
  113. st, _ := status.FromError(err)
  114. if st.Code() == codes.NotFound {
  115. return nil, esv1.NoSecretErr
  116. }
  117. return nil, fmt.Errorf("failed to get the secret by path '%s': %w", path, err)
  118. }
  119. return secret.GetPayload().GetValue(), nil
  120. }
  121. // AccessSecretVersion retrieves a specific version of a secret from CloudRU Secret Manager.
  122. func (c *APIClient) AccessSecretVersion(ctx context.Context, id, version string) ([]byte, error) {
  123. var err error
  124. ctx, err = c.authCtx(ctx)
  125. if err != nil {
  126. return nil, fmt.Errorf(errUnauthorized, err)
  127. }
  128. if version == "" {
  129. version = "latest"
  130. }
  131. req := &smsV1.AccessSecretVersionRequest{
  132. SecretId: id,
  133. SecretVersionId: version,
  134. }
  135. secret, err := c.smsClient.SecretService.AccessSecretVersion(ctx, req)
  136. if err != nil {
  137. st, _ := status.FromError(err)
  138. if st.Code() == codes.NotFound {
  139. return nil, esv1.NoSecretErr
  140. }
  141. return nil, fmt.Errorf("failed to get the secret by id '%s v%s': %w", id, version, err)
  142. }
  143. return secret.GetData().GetValue(), nil
  144. }
  145. func (c *APIClient) authCtx(ctx context.Context) (context.Context, error) {
  146. md, ok := metadata.FromOutgoingContext(ctx)
  147. if !ok {
  148. md = metadata.New(map[string]string{})
  149. }
  150. token, err := c.getOrCreateToken(ctx)
  151. if err != nil {
  152. return ctx, fmt.Errorf("fetch IAM access token: %w", err)
  153. }
  154. md.Set("authorization", "Bearer "+token)
  155. return metadata.NewOutgoingContext(ctx, md), nil
  156. }
  157. func (c *APIClient) getOrCreateToken(ctx context.Context) (string, error) {
  158. c.mu.Lock()
  159. defer c.mu.Unlock()
  160. if c.accessToken != "" && c.accessTokenExpiresAt.After(time.Now()) {
  161. return c.accessToken, nil
  162. }
  163. creds, err := c.cr.Resolve(ctx)
  164. if err != nil {
  165. return "", fmt.Errorf("resolve API credentials: %w", err)
  166. }
  167. resp, err := c.iamClient.GetToken(ctx, &iamAuthV1.GetTokenRequest{KeyId: creds.KeyID, Secret: creds.Secret})
  168. if err != nil {
  169. return "", fmt.Errorf("get access token: %w", err)
  170. }
  171. c.accessToken = resp.AccessToken
  172. c.accessTokenExpiresAt = time.Now().Add(time.Second * time.Duration(resp.ExpiresIn))
  173. return c.accessToken, nil
  174. }