provider.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package ibm
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "strings"
  18. "time"
  19. "github.com/IBM/go-sdk-core/v5/core"
  20. "github.com/external-secrets/external-secrets/pkg/utils"
  21. "github.com/tidwall/gjson"
  22. "k8s.io/apimachinery/pkg/types"
  23. sm "github.com/IBM/secrets-manager-go-sdk/secretsmanagerv1"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. corev1 "k8s.io/api/core/v1"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  28. )
  29. const (
  30. SecretsManagerEndpointEnv = "IBM_SECRETSMANAGER_ENDPOINT"
  31. STSEndpointEnv = "IBM_STS_ENDPOINT"
  32. SSMEndpointEnv = "IBM_SSM_ENDPOINT"
  33. errIBMClient = "cannot setup new ibm client: %w"
  34. errIBMCredSecretName = "invalid IBM SecretStore resource: missing IBM APIKey"
  35. errUninitalizedIBMProvider = "provider IBM is not initialized"
  36. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  37. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  38. errMissingSAK = "missing SecretAccessKey"
  39. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  40. )
  41. type SecretManagerClient interface {
  42. GetSecret(getSecretOptions *sm.GetSecretOptions) (result *sm.GetSecret, response *core.DetailedResponse, err error)
  43. }
  44. type providerIBM struct {
  45. IBMClient SecretManagerClient
  46. }
  47. type client struct {
  48. kube kclient.Client
  49. store *esv1beta1.IBMProvider
  50. namespace string
  51. storeKind string
  52. credentials []byte
  53. }
  54. var log = ctrl.Log.WithName("provider").WithName("ibm").WithName("secretsmanager")
  55. func (c *client) setAuth(ctx context.Context) error {
  56. credentialsSecret := &corev1.Secret{}
  57. credentialsSecretName := c.store.Auth.SecretRef.SecretAPIKey.Name
  58. if credentialsSecretName == "" {
  59. return fmt.Errorf(errIBMCredSecretName)
  60. }
  61. objectKey := types.NamespacedName{
  62. Name: credentialsSecretName,
  63. Namespace: c.namespace,
  64. }
  65. // only ClusterStore is allowed to set namespace (and then it's required)
  66. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  67. if c.store.Auth.SecretRef.SecretAPIKey.Namespace == nil {
  68. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  69. }
  70. objectKey.Namespace = *c.store.Auth.SecretRef.SecretAPIKey.Namespace
  71. }
  72. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  73. if err != nil {
  74. return fmt.Errorf(errFetchSAKSecret, err)
  75. }
  76. c.credentials = credentialsSecret.Data[c.store.Auth.SecretRef.SecretAPIKey.Key]
  77. if (c.credentials == nil) || (len(c.credentials) == 0) {
  78. return fmt.Errorf(errMissingSAK)
  79. }
  80. return nil
  81. }
  82. // Empty GetAllSecrets.
  83. func (ibm *providerIBM) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  84. // TO be implemented
  85. return nil, fmt.Errorf("GetAllSecrets not implemented")
  86. }
  87. func (ibm *providerIBM) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  88. if utils.IsNil(ibm.IBMClient) {
  89. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  90. }
  91. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  92. secretName := ref.Key
  93. nameSplitted := strings.Split(secretName, "/")
  94. if len(nameSplitted) > 1 {
  95. secretType = nameSplitted[0]
  96. secretName = nameSplitted[1]
  97. }
  98. switch secretType {
  99. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  100. return getArbitrarySecret(ibm, &secretName)
  101. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  102. if ref.Property == "" {
  103. return nil, fmt.Errorf("remoteRef.property required for secret type username_password")
  104. }
  105. return getUsernamePasswordSecret(ibm, &secretName, ref)
  106. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  107. return getIamCredentialsSecret(ibm, &secretName)
  108. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  109. if ref.Property == "" {
  110. return nil, fmt.Errorf("remoteRef.property required for secret type imported_cert")
  111. }
  112. return getImportCertSecret(ibm, &secretName, ref)
  113. case sm.CreateSecretOptionsSecretTypeKvConst:
  114. if ref.Property == "" {
  115. return nil, fmt.Errorf("remoteRef.property required for secret type kv")
  116. }
  117. return getKVSecret(ibm, &secretName, ref)
  118. default:
  119. return nil, fmt.Errorf("unknown secret type %s", secretType)
  120. }
  121. }
  122. func getArbitrarySecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  123. response, _, err := ibm.IBMClient.GetSecret(
  124. &sm.GetSecretOptions{
  125. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  126. ID: secretName,
  127. })
  128. if err != nil {
  129. return nil, err
  130. }
  131. secret := response.Resources[0].(*sm.SecretResource)
  132. secretData := secret.SecretData.(map[string]interface{})
  133. arbitrarySecretPayload := secretData["payload"].(string)
  134. return []byte(arbitrarySecretPayload), nil
  135. }
  136. func getImportCertSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  137. response, _, err := ibm.IBMClient.GetSecret(
  138. &sm.GetSecretOptions{
  139. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  140. ID: secretName,
  141. })
  142. if err != nil {
  143. return nil, err
  144. }
  145. secret := response.Resources[0].(*sm.SecretResource)
  146. secretData := secret.SecretData.(map[string]interface{})
  147. if val, ok := secretData[ref.Property]; ok {
  148. return []byte(val.(string)), nil
  149. }
  150. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  151. }
  152. func getIamCredentialsSecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  153. response, _, err := ibm.IBMClient.GetSecret(
  154. &sm.GetSecretOptions{
  155. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  156. ID: secretName,
  157. })
  158. if err != nil {
  159. return nil, err
  160. }
  161. secret := response.Resources[0].(*sm.SecretResource)
  162. secretData := *secret.APIKey
  163. return []byte(secretData), nil
  164. }
  165. func getUsernamePasswordSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  166. response, _, err := ibm.IBMClient.GetSecret(
  167. &sm.GetSecretOptions{
  168. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  169. ID: secretName,
  170. })
  171. if err != nil {
  172. return nil, err
  173. }
  174. secret := response.Resources[0].(*sm.SecretResource)
  175. secretData := secret.SecretData.(map[string]interface{})
  176. if val, ok := secretData[ref.Property]; ok {
  177. return []byte(val.(string)), nil
  178. }
  179. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  180. }
  181. // Returns a secret of type kv and supports json path.
  182. func getKVSecret(ibm *providerIBM, secretName *string, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  183. secret, err := getSecretByType(ibm, secretName, sm.CreateSecretOptionsSecretTypeKvConst)
  184. if err != nil {
  185. return nil, err
  186. }
  187. log.Info("getKVSecret", "secretName", secretName)
  188. secretData := secret.SecretData.(map[string]interface{})
  189. payload, ok := secretData["payload"]
  190. if !ok {
  191. return nil, fmt.Errorf("no payload returned for secret %s", ref.Key)
  192. }
  193. payloadJSON := payload
  194. payloadJSONMap, ok := payloadJSON.(map[string]interface{})
  195. if ok {
  196. var payloadJSONByte []byte
  197. payloadJSONByte, err = json.Marshal(payloadJSONMap)
  198. if err != nil {
  199. return nil, fmt.Errorf("marshaling payload from secret failed. %w", err)
  200. }
  201. payloadJSON = string(payloadJSONByte)
  202. }
  203. if ref.Property != "" {
  204. val := gjson.Get(payloadJSON.(string), ref.Property)
  205. if !val.Exists() {
  206. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  207. }
  208. return []byte(val.String()), nil
  209. }
  210. return nil, fmt.Errorf("no property provided for secret %s", ref.Key)
  211. }
  212. func getSecretByType(ibm *providerIBM, secretName *string, secretType string) (*sm.SecretResource, error) {
  213. response, _, err := ibm.IBMClient.GetSecret(
  214. &sm.GetSecretOptions{
  215. SecretType: core.StringPtr(secretType),
  216. ID: secretName,
  217. })
  218. if err != nil {
  219. return nil, err
  220. }
  221. secret := response.Resources[0].(*sm.SecretResource)
  222. return secret, nil
  223. }
  224. func (ibm *providerIBM) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  225. if utils.IsNil(ibm.IBMClient) {
  226. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  227. }
  228. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  229. secretName := ref.Key
  230. nameSplitted := strings.Split(secretName, "/")
  231. if len(nameSplitted) > 1 {
  232. secretType = nameSplitted[0]
  233. secretName = nameSplitted[1]
  234. }
  235. switch secretType {
  236. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  237. response, _, err := ibm.IBMClient.GetSecret(
  238. &sm.GetSecretOptions{
  239. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  240. ID: &ref.Key,
  241. })
  242. if err != nil {
  243. return nil, err
  244. }
  245. secret := response.Resources[0].(*sm.SecretResource)
  246. secretData := secret.SecretData.(map[string]interface{})
  247. arbitrarySecretPayload := secretData["payload"].(string)
  248. kv := make(map[string]interface{})
  249. err = json.Unmarshal([]byte(arbitrarySecretPayload), &kv)
  250. if err != nil {
  251. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  252. }
  253. secretMap := byteArrayMap(kv)
  254. return secretMap, nil
  255. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  256. response, _, err := ibm.IBMClient.GetSecret(
  257. &sm.GetSecretOptions{
  258. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  259. ID: &secretName,
  260. })
  261. if err != nil {
  262. return nil, err
  263. }
  264. secret := response.Resources[0].(*sm.SecretResource)
  265. secretData := secret.SecretData.(map[string]interface{})
  266. secretMap := byteArrayMap(secretData)
  267. return secretMap, nil
  268. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  269. response, _, err := ibm.IBMClient.GetSecret(
  270. &sm.GetSecretOptions{
  271. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  272. ID: &secretName,
  273. })
  274. if err != nil {
  275. return nil, err
  276. }
  277. secret := response.Resources[0].(*sm.SecretResource)
  278. secretData := *secret.APIKey
  279. secretMap := make(map[string][]byte)
  280. secretMap["apikey"] = []byte(secretData)
  281. return secretMap, nil
  282. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  283. response, _, err := ibm.IBMClient.GetSecret(
  284. &sm.GetSecretOptions{
  285. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  286. ID: &secretName,
  287. })
  288. if err != nil {
  289. return nil, err
  290. }
  291. secret := response.Resources[0].(*sm.SecretResource)
  292. secretData := secret.SecretData.(map[string]interface{})
  293. secretMap := byteArrayMap(secretData)
  294. return secretMap, nil
  295. case sm.CreateSecretOptionsSecretTypeKvConst:
  296. secret, err := getSecretByType(ibm, &secretName, sm.CreateSecretOptionsSecretTypeKvConst)
  297. if err != nil {
  298. return nil, err
  299. }
  300. secretData := secret.SecretData.(map[string]interface{})
  301. secretPayload := secretData["payload"].(string)
  302. kv := make(map[string]interface{})
  303. err = json.Unmarshal([]byte(secretPayload), &kv)
  304. if err != nil {
  305. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  306. }
  307. secretMap := byteArrayMap(kv)
  308. return secretMap, nil
  309. default:
  310. return nil, fmt.Errorf("unknown secret type %s", secretType)
  311. }
  312. }
  313. func byteArrayMap(secretData map[string]interface{}) map[string][]byte {
  314. secretMap := make(map[string][]byte)
  315. for k, v := range secretData {
  316. secretMap[k] = []byte(v.(string))
  317. }
  318. return secretMap
  319. }
  320. func (ibm *providerIBM) Close(ctx context.Context) error {
  321. return nil
  322. }
  323. func (ibm *providerIBM) Validate() error {
  324. return nil
  325. }
  326. func (ibm *providerIBM) ValidateStore(store esv1beta1.GenericStore) error {
  327. return nil
  328. }
  329. func (ibm *providerIBM) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  330. storeSpec := store.GetSpec()
  331. ibmSpec := storeSpec.Provider.IBM
  332. iStore := &client{
  333. kube: kube,
  334. store: ibmSpec,
  335. namespace: namespace,
  336. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  337. }
  338. if err := iStore.setAuth(ctx); err != nil {
  339. return nil, err
  340. }
  341. secretsManager, err := sm.NewSecretsManagerV1(&sm.SecretsManagerV1Options{
  342. URL: *storeSpec.Provider.IBM.ServiceURL,
  343. Authenticator: &core.IamAuthenticator{
  344. ApiKey: string(iStore.credentials),
  345. },
  346. })
  347. // Setup retry options, but only if present
  348. if storeSpec.RetrySettings != nil {
  349. var retryAmount int
  350. var retryDuration time.Duration
  351. if storeSpec.RetrySettings.MaxRetries != nil {
  352. retryAmount = int(*storeSpec.RetrySettings.MaxRetries)
  353. } else {
  354. retryAmount = 3
  355. }
  356. if storeSpec.RetrySettings.RetryInterval != nil {
  357. retryDuration, err = time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  358. } else {
  359. retryDuration = 5 * time.Second
  360. }
  361. if err == nil {
  362. secretsManager.Service.EnableRetries(retryAmount, retryDuration)
  363. }
  364. }
  365. if err != nil {
  366. return nil, fmt.Errorf(errIBMClient, err)
  367. }
  368. ibm.IBMClient = secretsManager
  369. return ibm, nil
  370. }
  371. func init() {
  372. esv1beta1.Register(&providerIBM{}, &esv1beta1.SecretStoreProvider{
  373. IBM: &esv1beta1.IBMProvider{},
  374. })
  375. }