kms.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package alibaba
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "time"
  18. kmssdk "github.com/aliyun/alibaba-cloud-sdk-go/services/kms"
  19. "github.com/tidwall/gjson"
  20. corev1 "k8s.io/api/core/v1"
  21. "k8s.io/apimachinery/pkg/types"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. )
  27. const (
  28. errAlibabaClient = "cannot setup new Alibaba client: %w"
  29. errAlibabaCredSecretName = "invalid Alibaba SecretStore resource: missing Alibaba APIKey"
  30. errUninitalizedAlibabaProvider = "provider Alibaba is not initialized"
  31. errInvalidClusterStoreMissingAKIDNamespace = "invalid ClusterStore, missing AccessKeyID namespace"
  32. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  33. errFetchAKIDSecret = "could not fetch AccessKeyID secret: %w"
  34. errMissingSAK = "missing AccessSecretKey"
  35. errMissingAKID = "missing AccessKeyID"
  36. )
  37. type Client struct {
  38. kube kclient.Client
  39. store *esv1beta1.AlibabaProvider
  40. namespace string
  41. storeKind string
  42. regionID string
  43. keyID []byte
  44. accessKey []byte
  45. }
  46. // https://github.com/external-secrets/external-secrets/issues/644
  47. var _ esv1beta1.SecretsClient = &KeyManagementService{}
  48. var _ esv1beta1.Provider = &KeyManagementService{}
  49. type KeyManagementService struct {
  50. Client SMInterface
  51. url string
  52. }
  53. type SMInterface interface {
  54. GetSecretValue(request *kmssdk.GetSecretValueRequest) (response *kmssdk.GetSecretValueResponse, err error)
  55. }
  56. // setAuth creates a new Alibaba session based on a store.
  57. func (c *Client) setAuth(ctx context.Context) error {
  58. credentialsSecret := &corev1.Secret{}
  59. credentialsSecretName := c.store.Auth.SecretRef.AccessKeyID.Name
  60. if credentialsSecretName == "" {
  61. return fmt.Errorf(errAlibabaCredSecretName)
  62. }
  63. objectKey := types.NamespacedName{
  64. Name: credentialsSecretName,
  65. Namespace: c.namespace,
  66. }
  67. // only ClusterStore is allowed to set namespace (and then it's required)
  68. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  69. if c.store.Auth.SecretRef.AccessKeyID.Namespace == nil {
  70. return fmt.Errorf(errInvalidClusterStoreMissingAKIDNamespace)
  71. }
  72. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeyID.Namespace
  73. }
  74. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  75. if err != nil {
  76. return fmt.Errorf(errFetchAKIDSecret, err)
  77. }
  78. objectKey = types.NamespacedName{
  79. Name: c.store.Auth.SecretRef.AccessKeySecret.Name,
  80. Namespace: c.namespace,
  81. }
  82. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  83. if c.store.Auth.SecretRef.AccessKeySecret.Namespace == nil {
  84. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  85. }
  86. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeySecret.Namespace
  87. }
  88. c.keyID = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeyID.Key]
  89. fmt.Println(c.keyID)
  90. fmt.Println(c.accessKey)
  91. if (c.keyID == nil) || (len(c.keyID) == 0) {
  92. return fmt.Errorf(errMissingAKID)
  93. }
  94. c.accessKey = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeySecret.Key]
  95. if (c.accessKey == nil) || (len(c.accessKey) == 0) {
  96. return fmt.Errorf(errMissingSAK)
  97. }
  98. c.regionID = c.store.RegionID
  99. return nil
  100. }
  101. func (kms *KeyManagementService) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  102. return fmt.Errorf("not implemented")
  103. }
  104. func (kms *KeyManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  105. return fmt.Errorf("not implemented")
  106. }
  107. // Empty GetAllSecrets.
  108. func (kms *KeyManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  109. // TO be implemented
  110. return nil, fmt.Errorf("GetAllSecrets not implemented")
  111. }
  112. // GetSecret returns a single secret from the provider.
  113. func (kms *KeyManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  114. if utils.IsNil(kms.Client) {
  115. return nil, fmt.Errorf(errUninitalizedAlibabaProvider)
  116. }
  117. kmsRequest := kmssdk.CreateGetSecretValueRequest()
  118. kmsRequest.VersionId = ref.Version
  119. kmsRequest.SecretName = ref.Key
  120. kmsRequest.SetScheme("https")
  121. secretOut, err := kms.Client.GetSecretValue(kmsRequest)
  122. if err != nil {
  123. return nil, util.SanitizeErr(err)
  124. }
  125. if ref.Property == "" {
  126. if secretOut.SecretData != "" {
  127. return []byte(secretOut.SecretData), nil
  128. }
  129. return nil, fmt.Errorf("invalid secret received. no secret string nor binary for key: %s", ref.Key)
  130. }
  131. var payload string
  132. if secretOut.SecretData != "" {
  133. payload = secretOut.SecretData
  134. }
  135. val := gjson.Get(payload, ref.Property)
  136. if !val.Exists() {
  137. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  138. }
  139. return []byte(val.String()), nil
  140. }
  141. // GetSecretMap returns multiple k/v pairs from the provider.
  142. func (kms *KeyManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  143. data, err := kms.GetSecret(ctx, ref)
  144. if err != nil {
  145. return nil, err
  146. }
  147. kv := make(map[string]string)
  148. err = json.Unmarshal(data, &kv)
  149. if err != nil {
  150. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  151. }
  152. secretData := make(map[string][]byte)
  153. for k, v := range kv {
  154. secretData[k] = []byte(v)
  155. }
  156. return secretData, nil
  157. }
  158. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  159. func (kms *KeyManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  160. return esv1beta1.SecretStoreReadOnly
  161. }
  162. // NewClient constructs a new secrets client based on the provided store.
  163. func (kms *KeyManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  164. storeSpec := store.GetSpec()
  165. alibabaSpec := storeSpec.Provider.Alibaba
  166. iStore := &Client{
  167. kube: kube,
  168. store: alibabaSpec,
  169. namespace: namespace,
  170. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  171. }
  172. if err := iStore.setAuth(ctx); err != nil {
  173. return nil, err
  174. }
  175. alibabaRegion := iStore.regionID
  176. alibabaKeyID := iStore.keyID
  177. alibabaSecretKey := iStore.accessKey
  178. keyManagementService, err := kmssdk.NewClientWithAccessKey(alibabaRegion, string(alibabaKeyID), string(alibabaSecretKey))
  179. if err != nil {
  180. return nil, fmt.Errorf(errAlibabaClient, err)
  181. }
  182. kms.Client = keyManagementService
  183. kms.url = alibabaSpec.Endpoint
  184. return kms, nil
  185. }
  186. func (kms *KeyManagementService) Close(ctx context.Context) error {
  187. return nil
  188. }
  189. func (kms *KeyManagementService) Validate() (esv1beta1.ValidationResult, error) {
  190. timeout := 15 * time.Second
  191. url := kms.url
  192. if err := utils.NetworkValidate(url, timeout); err != nil {
  193. return esv1beta1.ValidationResultError, err
  194. }
  195. return esv1beta1.ValidationResultReady, nil
  196. }
  197. func (kms *KeyManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  198. storeSpec := store.GetSpec()
  199. alibabaSpec := storeSpec.Provider.Alibaba
  200. regionID := alibabaSpec.RegionID
  201. if regionID == "" {
  202. return fmt.Errorf("missing alibaba region")
  203. }
  204. accessKeyID := alibabaSpec.Auth.SecretRef.AccessKeyID
  205. err := utils.ValidateSecretSelector(store, accessKeyID)
  206. if err != nil {
  207. return err
  208. }
  209. if accessKeyID.Name == "" {
  210. return fmt.Errorf("missing alibaba access ID name")
  211. }
  212. if accessKeyID.Key == "" {
  213. return fmt.Errorf("missing alibaba access ID key")
  214. }
  215. accessKeySecret := alibabaSpec.Auth.SecretRef.AccessKeySecret
  216. err = utils.ValidateSecretSelector(store, accessKeySecret)
  217. if err != nil {
  218. return err
  219. }
  220. if accessKeySecret.Name == "" {
  221. return fmt.Errorf("missing alibaba access key secret name")
  222. }
  223. if accessKeySecret.Key == "" {
  224. return fmt.Errorf("missing alibaba access key secret key")
  225. }
  226. return nil
  227. }
  228. func init() {
  229. esv1beta1.Register(&KeyManagementService{}, &esv1beta1.SecretStoreProvider{
  230. Alibaba: &esv1beta1.AlibabaProvider{},
  231. })
  232. }