provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. // Package conjur provides a Conjur provider for External Secrets.
  13. package conjur
  14. import (
  15. "context"
  16. "encoding/json"
  17. "fmt"
  18. "strings"
  19. "github.com/cyberark/conjur-api-go/conjurapi"
  20. "github.com/cyberark/conjur-api-go/conjurapi/authn"
  21. corev1 "k8s.io/api/core/v1"
  22. "k8s.io/client-go/kubernetes"
  23. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  24. "sigs.k8s.io/controller-runtime/pkg/client"
  25. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  26. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  27. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. "github.com/external-secrets/external-secrets/pkg/provider/conjur/util"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  32. )
  33. var (
  34. errConjurClient = "cannot setup new Conjur client: %w"
  35. errBadCertBundle = "caBundle failed to base64 decode: %w"
  36. errBadServiceUser = "could not get Auth.Apikey.UserRef: %w"
  37. errBadServiceAPIKey = "could not get Auth.Apikey.ApiKeyRef: %w"
  38. errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
  39. errUnableToFetchCAProviderCM = "unable to fetch Server.CAProvider ConfigMap: %w"
  40. errUnableToFetchCAProviderSecret = "unable to fetch Server.CAProvider Secret: %w"
  41. )
  42. // Client is a provider for Conjur.
  43. type Client struct {
  44. StoreKind string
  45. kube client.Client
  46. store esv1beta1.GenericStore
  47. namespace string
  48. corev1 typedcorev1.CoreV1Interface
  49. clientAPI SecretsClientFactory
  50. client SecretsClient
  51. }
  52. type Provider struct {
  53. NewConjurProvider func(context context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, corev1 typedcorev1.CoreV1Interface, clientApi SecretsClientFactory) (esv1beta1.SecretsClient, error)
  54. }
  55. // NewClient creates a new Conjur client.
  56. func (c *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  57. // controller-runtime/client does not support TokenRequest or other subresource APIs
  58. // so we need to construct our own client and use it to create a TokenRequest
  59. restCfg, err := ctrlcfg.GetConfig()
  60. if err != nil {
  61. return nil, err
  62. }
  63. clientset, err := kubernetes.NewForConfig(restCfg)
  64. if err != nil {
  65. return nil, err
  66. }
  67. return c.NewConjurProvider(ctx, store, kube, namespace, clientset.CoreV1(), &ClientAPIImpl{})
  68. }
  69. func newConjurProvider(_ context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, corev1 typedcorev1.CoreV1Interface, clientAPI SecretsClientFactory) (esv1beta1.SecretsClient, error) {
  70. return &Client{
  71. StoreKind: store.GetObjectKind().GroupVersionKind().Kind,
  72. store: store,
  73. kube: kube,
  74. namespace: namespace,
  75. corev1: corev1,
  76. clientAPI: clientAPI,
  77. }, nil
  78. }
  79. func (p *Client) GetConjurClient(ctx context.Context) (SecretsClient, error) {
  80. // if the client is initialized already, return it
  81. if p.client != nil {
  82. return p.client, nil
  83. }
  84. prov, err := util.GetConjurProvider(p.store)
  85. if err != nil {
  86. return nil, err
  87. }
  88. cert, getCertErr := p.getCA(ctx, prov)
  89. if getCertErr != nil {
  90. return nil, getCertErr
  91. }
  92. config := conjurapi.Config{
  93. ApplianceURL: prov.URL,
  94. SSLCert: cert,
  95. }
  96. if prov.Auth.APIKey != nil {
  97. config.Account = prov.Auth.APIKey.Account
  98. conjUser, secErr := resolvers.SecretKeyRef(
  99. ctx,
  100. p.kube,
  101. p.StoreKind,
  102. p.namespace, prov.Auth.APIKey.UserRef)
  103. if secErr != nil {
  104. return nil, fmt.Errorf(errBadServiceUser, secErr)
  105. }
  106. conjAPIKey, secErr := resolvers.SecretKeyRef(
  107. ctx,
  108. p.kube,
  109. p.StoreKind,
  110. p.namespace,
  111. prov.Auth.APIKey.APIKeyRef)
  112. if secErr != nil {
  113. return nil, fmt.Errorf(errBadServiceAPIKey, secErr)
  114. }
  115. conjur, newClientFromKeyError := p.clientAPI.NewClientFromKey(config,
  116. authn.LoginPair{
  117. Login: conjUser,
  118. APIKey: conjAPIKey,
  119. },
  120. )
  121. if newClientFromKeyError != nil {
  122. return nil, fmt.Errorf(errConjurClient, newClientFromKeyError)
  123. }
  124. p.client = conjur
  125. return conjur, nil
  126. } else if prov.Auth.Jwt != nil {
  127. config.Account = prov.Auth.Jwt.Account
  128. conjur, clientFromJwtError := p.newClientFromJwt(ctx, config, prov.Auth.Jwt)
  129. if clientFromJwtError != nil {
  130. return nil, fmt.Errorf(errConjurClient, clientFromJwtError)
  131. }
  132. p.client = conjur
  133. return conjur, nil
  134. } else {
  135. // Should not happen because validate func should catch this
  136. return nil, fmt.Errorf("no authentication method provided")
  137. }
  138. }
  139. // GetAllSecrets returns all secrets from the provider.
  140. // NOT IMPLEMENTED.
  141. func (p *Client) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  142. // TO be implemented
  143. return nil, fmt.Errorf("GetAllSecrets not implemented")
  144. }
  145. // GetSecret returns a single secret from the provider.
  146. func (p *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  147. conjurClient, getConjurClientError := p.GetConjurClient(ctx)
  148. if getConjurClientError != nil {
  149. return nil, getConjurClientError
  150. }
  151. secretValue, err := conjurClient.RetrieveSecret(ref.Key)
  152. if err != nil {
  153. return nil, err
  154. }
  155. return secretValue, nil
  156. }
  157. // PushSecret will write a single secret into the provider.
  158. func (p *Client) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  159. // NOT IMPLEMENTED
  160. return nil
  161. }
  162. func (p *Client) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  163. // NOT IMPLEMENTED
  164. return nil
  165. }
  166. // GetSecretMap returns multiple k/v pairs from the provider.
  167. func (p *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  168. // Gets a secret as normal, expecting secret value to be a json object
  169. data, err := p.GetSecret(ctx, ref)
  170. if err != nil {
  171. return nil, fmt.Errorf("error getting secret %s: %w", ref.Key, err)
  172. }
  173. // Maps the json data to a string:string map
  174. kv := make(map[string]string)
  175. err = json.Unmarshal(data, &kv)
  176. if err != nil {
  177. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  178. }
  179. // Converts values in K:V pairs into bytes, while leaving keys as strings
  180. secretData := make(map[string][]byte)
  181. for k, v := range kv {
  182. secretData[k] = []byte(v)
  183. }
  184. return secretData, nil
  185. }
  186. // Close closes the provider.
  187. func (p *Client) Close(_ context.Context) error {
  188. return nil
  189. }
  190. // Validate validates the provider.
  191. func (p *Client) Validate() (esv1beta1.ValidationResult, error) {
  192. return esv1beta1.ValidationResultReady, nil
  193. }
  194. // ValidateStore validates the store.
  195. func (c *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  196. prov, err := util.GetConjurProvider(store)
  197. if err != nil {
  198. return nil, err
  199. }
  200. if prov.URL == "" {
  201. return nil, fmt.Errorf("conjur URL cannot be empty")
  202. }
  203. if prov.Auth.APIKey != nil {
  204. if prov.Auth.APIKey.Account == "" {
  205. return nil, fmt.Errorf("missing Auth.ApiKey.Account")
  206. }
  207. if prov.Auth.APIKey.UserRef == nil {
  208. return nil, fmt.Errorf("missing Auth.Apikey.UserRef")
  209. }
  210. if prov.Auth.APIKey.APIKeyRef == nil {
  211. return nil, fmt.Errorf("missing Auth.Apikey.ApiKeyRef")
  212. }
  213. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.APIKey.UserRef); err != nil {
  214. return nil, fmt.Errorf("invalid Auth.Apikey.UserRef: %w", err)
  215. }
  216. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.APIKey.APIKeyRef); err != nil {
  217. return nil, fmt.Errorf("invalid Auth.Apikey.ApiKeyRef: %w", err)
  218. }
  219. }
  220. if prov.Auth.Jwt != nil {
  221. if prov.Auth.Jwt.Account == "" {
  222. return nil, fmt.Errorf("missing Auth.Jwt.Account")
  223. }
  224. if prov.Auth.Jwt.ServiceID == "" {
  225. return nil, fmt.Errorf("missing Auth.Jwt.ServiceID")
  226. }
  227. if prov.Auth.Jwt.ServiceAccountRef == nil && prov.Auth.Jwt.SecretRef == nil {
  228. return nil, fmt.Errorf("must specify Auth.Jwt.SecretRef or Auth.Jwt.ServiceAccountRef")
  229. }
  230. if prov.Auth.Jwt.SecretRef != nil {
  231. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.Jwt.SecretRef); err != nil {
  232. return nil, fmt.Errorf("invalid Auth.Jwt.SecretRef: %w", err)
  233. }
  234. }
  235. if prov.Auth.Jwt.ServiceAccountRef != nil {
  236. if err := utils.ValidateReferentServiceAccountSelector(store, *prov.Auth.Jwt.ServiceAccountRef); err != nil {
  237. return nil, fmt.Errorf("invalid Auth.Jwt.ServiceAccountRef: %w", err)
  238. }
  239. }
  240. }
  241. // At least one auth must be configured
  242. if prov.Auth.APIKey == nil && prov.Auth.Jwt == nil {
  243. return nil, fmt.Errorf("missing Auth.* configuration")
  244. }
  245. return nil, nil
  246. }
  247. // Capabilities returns the provider Capabilities (Read, Write, ReadWrite).
  248. func (c *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  249. return esv1beta1.SecretStoreReadOnly
  250. }
  251. // configMapKeyRef returns the value of a key in a ConfigMap.
  252. func (p *Client) configMapKeyRef(ctx context.Context, cmRef *esmeta.SecretKeySelector) (string, error) {
  253. configMap := &corev1.ConfigMap{}
  254. ref := client.ObjectKey{
  255. Namespace: p.namespace,
  256. Name: cmRef.Name,
  257. }
  258. if (p.StoreKind == esv1beta1.ClusterSecretStoreKind) &&
  259. (cmRef.Namespace != nil) {
  260. ref.Namespace = *cmRef.Namespace
  261. }
  262. err := p.kube.Get(ctx, ref, configMap)
  263. if err != nil {
  264. return "", err
  265. }
  266. keyBytes, ok := configMap.Data[cmRef.Key]
  267. if !ok {
  268. return "", err
  269. }
  270. valueStr := strings.TrimSpace(keyBytes)
  271. return valueStr, nil
  272. }
  273. // getCA try retrieve the CA bundle from the provider CABundle or from the CAProvider.
  274. func (p *Client) getCA(ctx context.Context, provider *esv1beta1.ConjurProvider) (string, error) {
  275. if provider.CAProvider != nil {
  276. var ca string
  277. var err error
  278. switch provider.CAProvider.Type {
  279. case esv1beta1.CAProviderTypeConfigMap:
  280. keySelector := esmeta.SecretKeySelector{
  281. Name: provider.CAProvider.Name,
  282. Namespace: provider.CAProvider.Namespace,
  283. Key: provider.CAProvider.Key,
  284. }
  285. ca, err = p.configMapKeyRef(ctx, &keySelector)
  286. if err != nil {
  287. return "", fmt.Errorf(errUnableToFetchCAProviderCM, err)
  288. }
  289. case esv1beta1.CAProviderTypeSecret:
  290. keySelector := esmeta.SecretKeySelector{
  291. Name: provider.CAProvider.Name,
  292. Namespace: provider.CAProvider.Namespace,
  293. Key: provider.CAProvider.Key,
  294. }
  295. ca, err = resolvers.SecretKeyRef(
  296. ctx,
  297. p.kube,
  298. p.StoreKind,
  299. p.namespace,
  300. &keySelector)
  301. if err != nil {
  302. return "", fmt.Errorf(errUnableToFetchCAProviderSecret, err)
  303. }
  304. }
  305. return ca, nil
  306. }
  307. certBytes, decodeErr := utils.Decode(esv1beta1.ExternalSecretDecodeBase64, []byte(provider.CABundle))
  308. if decodeErr != nil {
  309. return "", fmt.Errorf(errBadCertBundle, decodeErr)
  310. }
  311. return string(certBytes), nil
  312. }
  313. func init() {
  314. esv1beta1.Register(&Provider{
  315. NewConjurProvider: newConjurProvider,
  316. }, &esv1beta1.SecretStoreProvider{
  317. Conjur: &esv1beta1.ConjurProvider{},
  318. })
  319. }