provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package ibm
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "strings"
  18. "time"
  19. "github.com/IBM/go-sdk-core/v5/core"
  20. sm "github.com/IBM/secrets-manager-go-sdk/secretsmanagerv1"
  21. corev1 "k8s.io/api/core/v1"
  22. "k8s.io/apimachinery/pkg/types"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  25. "github.com/external-secrets/external-secrets/pkg/provider"
  26. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  27. "github.com/external-secrets/external-secrets/pkg/utils"
  28. )
  29. const (
  30. SecretsManagerEndpointEnv = "IBM_SECRETSMANAGER_ENDPOINT"
  31. STSEndpointEnv = "IBM_STS_ENDPOINT"
  32. SSMEndpointEnv = "IBM_SSM_ENDPOINT"
  33. errIBMClient = "cannot setup new ibm client: %w"
  34. errIBMCredSecretName = "invalid IBM SecretStore resource: missing IBM APIKey"
  35. errUninitalizedIBMProvider = "provider IBM is not initialized"
  36. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  37. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  38. errMissingSAK = "missing SecretAccessKey"
  39. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  40. )
  41. type SecretManagerClient interface {
  42. GetSecret(getSecretOptions *sm.GetSecretOptions) (result *sm.GetSecret, response *core.DetailedResponse, err error)
  43. }
  44. type providerIBM struct {
  45. IBMClient SecretManagerClient
  46. }
  47. type client struct {
  48. kube kclient.Client
  49. store *esv1alpha1.IBMProvider
  50. namespace string
  51. storeKind string
  52. credentials []byte
  53. }
  54. func (c *client) setAuth(ctx context.Context) error {
  55. credentialsSecret := &corev1.Secret{}
  56. credentialsSecretName := c.store.Auth.SecretRef.SecretAPIKey.Name
  57. if credentialsSecretName == "" {
  58. return fmt.Errorf(errIBMCredSecretName)
  59. }
  60. objectKey := types.NamespacedName{
  61. Name: credentialsSecretName,
  62. Namespace: c.namespace,
  63. }
  64. // only ClusterStore is allowed to set namespace (and then it's required)
  65. if c.storeKind == esv1alpha1.ClusterSecretStoreKind {
  66. if c.store.Auth.SecretRef.SecretAPIKey.Namespace == nil {
  67. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  68. }
  69. objectKey.Namespace = *c.store.Auth.SecretRef.SecretAPIKey.Namespace
  70. }
  71. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  72. if err != nil {
  73. return fmt.Errorf(errFetchSAKSecret, err)
  74. }
  75. c.credentials = credentialsSecret.Data[c.store.Auth.SecretRef.SecretAPIKey.Key]
  76. if (c.credentials == nil) || (len(c.credentials) == 0) {
  77. return fmt.Errorf(errMissingSAK)
  78. }
  79. return nil
  80. }
  81. // Implements store.Client.GetAllSecrets Interface.
  82. // New version of GetAllSecrets.
  83. func (ibm *providerIBM) GetAllSecrets(ctx context.Context, ref esv1alpha1.ExternalSecretDataFromRemoteRef) (map[string][]byte, error) {
  84. // TO be implemented
  85. return map[string][]byte{}, nil
  86. }
  87. func (ibm *providerIBM) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  88. if utils.IsNil(ibm.IBMClient) {
  89. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  90. }
  91. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  92. secretName := ref.Key
  93. nameSplitted := strings.Split(secretName, "/")
  94. if len(nameSplitted) > 1 {
  95. secretType = nameSplitted[0]
  96. secretName = nameSplitted[1]
  97. }
  98. switch secretType {
  99. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  100. return getArbitrarySecret(ibm, &secretName)
  101. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  102. if ref.Property == "" {
  103. return nil, fmt.Errorf("remoteRef.property required for secret type username_password")
  104. }
  105. return getUsernamePasswordSecret(ibm, &secretName, ref)
  106. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  107. return getIamCredentialsSecret(ibm, &secretName)
  108. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  109. if ref.Property == "" {
  110. return nil, fmt.Errorf("remoteref.Property required for secret type imported_cert")
  111. }
  112. return getImportCertSecret(ibm, &secretName, ref)
  113. default:
  114. return nil, fmt.Errorf("unknown secret type %s", secretType)
  115. }
  116. }
  117. func getArbitrarySecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  118. response, _, err := ibm.IBMClient.GetSecret(
  119. &sm.GetSecretOptions{
  120. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  121. ID: secretName,
  122. })
  123. if err != nil {
  124. return nil, err
  125. }
  126. secret := response.Resources[0].(*sm.SecretResource)
  127. secretData := secret.SecretData.(map[string]interface{})
  128. arbitrarySecretPayload := secretData["payload"].(string)
  129. return []byte(arbitrarySecretPayload), nil
  130. }
  131. func getImportCertSecret(ibm *providerIBM, secretName *string, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  132. response, _, err := ibm.IBMClient.GetSecret(
  133. &sm.GetSecretOptions{
  134. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  135. ID: secretName,
  136. })
  137. if err != nil {
  138. return nil, err
  139. }
  140. secret := response.Resources[0].(*sm.SecretResource)
  141. secretData := secret.SecretData.(map[string]interface{})
  142. if val, ok := secretData[ref.Property]; ok {
  143. return []byte(val.(string)), nil
  144. }
  145. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  146. }
  147. func getIamCredentialsSecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  148. response, _, err := ibm.IBMClient.GetSecret(
  149. &sm.GetSecretOptions{
  150. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  151. ID: secretName,
  152. })
  153. if err != nil {
  154. return nil, err
  155. }
  156. secret := response.Resources[0].(*sm.SecretResource)
  157. secretData := *secret.APIKey
  158. return []byte(secretData), nil
  159. }
  160. func getUsernamePasswordSecret(ibm *providerIBM, secretName *string, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  161. response, _, err := ibm.IBMClient.GetSecret(
  162. &sm.GetSecretOptions{
  163. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  164. ID: secretName,
  165. })
  166. if err != nil {
  167. return nil, err
  168. }
  169. secret := response.Resources[0].(*sm.SecretResource)
  170. secretData := secret.SecretData.(map[string]interface{})
  171. if val, ok := secretData[ref.Property]; ok {
  172. return []byte(val.(string)), nil
  173. }
  174. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  175. }
  176. func (ibm *providerIBM) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataFromRemoteRef) (map[string][]byte, error) {
  177. if utils.IsNil(ibm.IBMClient) {
  178. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  179. }
  180. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  181. secretName := ref.Extract.Key
  182. nameSplitted := strings.Split(secretName, "/")
  183. if len(nameSplitted) > 1 {
  184. secretType = nameSplitted[0]
  185. secretName = nameSplitted[1]
  186. }
  187. switch secretType {
  188. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  189. response, _, err := ibm.IBMClient.GetSecret(
  190. &sm.GetSecretOptions{
  191. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  192. ID: &ref.Extract.Key,
  193. })
  194. if err != nil {
  195. return nil, err
  196. }
  197. secret := response.Resources[0].(*sm.SecretResource)
  198. secretData := secret.SecretData.(map[string]interface{})
  199. arbitrarySecretPayload := secretData["payload"].(string)
  200. kv := make(map[string]interface{})
  201. err = json.Unmarshal([]byte(arbitrarySecretPayload), &kv)
  202. if err != nil {
  203. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  204. }
  205. secretMap := byteArrayMap(kv)
  206. return secretMap, nil
  207. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  208. response, _, err := ibm.IBMClient.GetSecret(
  209. &sm.GetSecretOptions{
  210. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  211. ID: &secretName,
  212. })
  213. if err != nil {
  214. return nil, err
  215. }
  216. secret := response.Resources[0].(*sm.SecretResource)
  217. secretData := secret.SecretData.(map[string]interface{})
  218. secretMap := byteArrayMap(secretData)
  219. return secretMap, nil
  220. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  221. response, _, err := ibm.IBMClient.GetSecret(
  222. &sm.GetSecretOptions{
  223. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  224. ID: &secretName,
  225. })
  226. if err != nil {
  227. return nil, err
  228. }
  229. secret := response.Resources[0].(*sm.SecretResource)
  230. secretData := *secret.APIKey
  231. secretMap := make(map[string][]byte)
  232. secretMap["apikey"] = []byte(secretData)
  233. return secretMap, nil
  234. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  235. response, _, err := ibm.IBMClient.GetSecret(
  236. &sm.GetSecretOptions{
  237. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  238. ID: &secretName,
  239. })
  240. if err != nil {
  241. return nil, err
  242. }
  243. secret := response.Resources[0].(*sm.SecretResource)
  244. secretData := secret.SecretData.(map[string]interface{})
  245. secretMap := byteArrayMap(secretData)
  246. return secretMap, nil
  247. default:
  248. return nil, fmt.Errorf("unknown secret type %s", secretType)
  249. }
  250. }
  251. func byteArrayMap(secretData map[string]interface{}) map[string][]byte {
  252. secretMap := make(map[string][]byte)
  253. for k, v := range secretData {
  254. secretMap[k] = []byte(v.(string))
  255. }
  256. return secretMap
  257. }
  258. func (ibm *providerIBM) Close(ctx context.Context) error {
  259. return nil
  260. }
  261. func (ibm *providerIBM) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  262. storeSpec := store.GetSpec()
  263. ibmSpec := storeSpec.Provider.IBM
  264. iStore := &client{
  265. kube: kube,
  266. store: ibmSpec,
  267. namespace: namespace,
  268. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  269. }
  270. if err := iStore.setAuth(ctx); err != nil {
  271. return nil, err
  272. }
  273. secretsManager, err := sm.NewSecretsManagerV1(&sm.SecretsManagerV1Options{
  274. URL: *storeSpec.Provider.IBM.ServiceURL,
  275. Authenticator: &core.IamAuthenticator{
  276. ApiKey: string(iStore.credentials),
  277. },
  278. })
  279. // Setup retry options, but only if present
  280. if storeSpec.RetrySettings != nil {
  281. var retryAmount int
  282. var retryDuration time.Duration
  283. if storeSpec.RetrySettings.MaxRetries != nil {
  284. retryAmount = int(*storeSpec.RetrySettings.MaxRetries)
  285. } else {
  286. retryAmount = 3
  287. }
  288. if storeSpec.RetrySettings.RetryInterval != nil {
  289. retryDuration, err = time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  290. } else {
  291. retryDuration = 5 * time.Second
  292. }
  293. if err == nil {
  294. secretsManager.Service.EnableRetries(retryAmount, retryDuration)
  295. }
  296. }
  297. if err != nil {
  298. return nil, fmt.Errorf(errIBMClient, err)
  299. }
  300. ibm.IBMClient = secretsManager
  301. return ibm, nil
  302. }
  303. func init() {
  304. schema.Register(&providerIBM{}, &esv1alpha1.SecretStoreProvider{
  305. IBM: &esv1alpha1.IBMProvider{},
  306. })
  307. }