oracle.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "context"
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "github.com/oracle/oci-go-sdk/v56/common"
  19. "github.com/oracle/oci-go-sdk/v56/common/auth"
  20. "github.com/oracle/oci-go-sdk/v56/keymanagement"
  21. "github.com/oracle/oci-go-sdk/v56/secrets"
  22. "github.com/tidwall/gjson"
  23. corev1 "k8s.io/api/core/v1"
  24. "k8s.io/apimachinery/pkg/types"
  25. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  28. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  29. "github.com/external-secrets/external-secrets/pkg/utils"
  30. )
  31. const (
  32. VaultEndpointEnv = "ORACLE_VAULT_ENDPOINT"
  33. STSEndpointEnv = "ORACLE_STS_ENDPOINT"
  34. SVMEndpointEnv = "ORACLE_SVM_ENDPOINT"
  35. errOracleClient = "cannot setup new oracle client: %w"
  36. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  37. errUninitalizedOracleProvider = "provider oracle is not initialized"
  38. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  39. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  40. errMissingPK = "missing PrivateKey"
  41. errMissingUser = "missing User ID"
  42. errMissingTenancy = "missing Tenancy ID"
  43. errMissingRegion = "missing Region"
  44. errMissingFingerprint = "missing Fingerprint"
  45. errMissingVault = "missing Vault"
  46. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  47. errMissingKey = "missing Key in secret: %s"
  48. errUnexpectedContent = "unexpected secret bundle content"
  49. )
  50. // https://github.com/external-secrets/external-secrets/issues/644
  51. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  52. var _ esv1beta1.Provider = &VaultManagementService{}
  53. type VaultManagementService struct {
  54. Client VMInterface
  55. KmsVaultClient KmsVCInterface
  56. vault string
  57. }
  58. type VMInterface interface {
  59. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  60. }
  61. type KmsVCInterface interface {
  62. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  63. }
  64. // Not Implemented PushSecret.
  65. func (vms *VaultManagementService) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  66. return fmt.Errorf("not implemented")
  67. }
  68. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  69. return fmt.Errorf("not implemented")
  70. }
  71. // Empty GetAllSecrets.
  72. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  73. // TO be implemented
  74. return nil, fmt.Errorf("GetAllSecrets not implemented")
  75. }
  76. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  77. if utils.IsNil(vms.Client) {
  78. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  79. }
  80. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  81. VaultId: &vms.vault,
  82. SecretName: &ref.Key,
  83. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  84. })
  85. if err != nil {
  86. return nil, util.SanitizeErr(err)
  87. }
  88. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  89. if !ok {
  90. return nil, fmt.Errorf(errUnexpectedContent)
  91. }
  92. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  93. if err != nil {
  94. return nil, err
  95. }
  96. if ref.Property == "" {
  97. return payload, nil
  98. }
  99. val := gjson.Get(string(payload), ref.Property)
  100. if !val.Exists() {
  101. return nil, fmt.Errorf(errMissingKey, ref.Key)
  102. }
  103. return []byte(val.String()), nil
  104. }
  105. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  106. data, err := vms.GetSecret(ctx, ref)
  107. if err != nil {
  108. return nil, err
  109. }
  110. kv := make(map[string]string)
  111. err = json.Unmarshal(data, &kv)
  112. if err != nil {
  113. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  114. }
  115. secretData := make(map[string][]byte)
  116. for k, v := range kv {
  117. secretData[k] = []byte(v)
  118. }
  119. return secretData, nil
  120. }
  121. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  122. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  123. return esv1beta1.SecretStoreReadOnly
  124. }
  125. // NewClient constructs a new secrets client based on the provided store.
  126. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  127. storeSpec := store.GetSpec()
  128. oracleSpec := storeSpec.Provider.Oracle
  129. if oracleSpec.Vault == "" {
  130. return nil, fmt.Errorf(errMissingVault)
  131. }
  132. if oracleSpec.Region == "" {
  133. return nil, fmt.Errorf(errMissingRegion)
  134. }
  135. var (
  136. err error
  137. configurationProvider common.ConfigurationProvider
  138. )
  139. if oracleSpec.Auth == nil {
  140. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  141. } else {
  142. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  143. }
  144. if err != nil {
  145. return nil, fmt.Errorf(errOracleClient, err)
  146. }
  147. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  148. if err != nil {
  149. return nil, fmt.Errorf(errOracleClient, err)
  150. }
  151. secretManagementService.SetRegion(oracleSpec.Region)
  152. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  153. if err != nil {
  154. return nil, fmt.Errorf(errOracleClient, err)
  155. }
  156. kmsVaultClient.SetRegion(oracleSpec.Region)
  157. return &VaultManagementService{
  158. Client: secretManagementService,
  159. KmsVaultClient: kmsVaultClient,
  160. vault: oracleSpec.Vault,
  161. }, nil
  162. }
  163. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  164. if secretRef.Name == "" {
  165. return "", fmt.Errorf(errORACLECredSecretName)
  166. }
  167. objectKey := types.NamespacedName{
  168. Name: secretRef.Name,
  169. Namespace: namespace,
  170. }
  171. // only ClusterStore is allowed to set namespace (and then it's required)
  172. if storeKind == esv1beta1.ClusterSecretStoreKind {
  173. if secretRef.Namespace == nil {
  174. return "", fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  175. }
  176. objectKey.Namespace = *secretRef.Namespace
  177. }
  178. secret := corev1.Secret{}
  179. err := kube.Get(ctx, objectKey, &secret)
  180. if err != nil {
  181. return "", fmt.Errorf(errFetchSAKSecret, err)
  182. }
  183. return string(secret.Data[secretRef.Key]), nil
  184. }
  185. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  186. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  187. if err != nil {
  188. return nil, err
  189. }
  190. if privateKey == "" {
  191. return nil, fmt.Errorf(errMissingPK)
  192. }
  193. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  194. if err != nil {
  195. return nil, err
  196. }
  197. if fingerprint == "" {
  198. return nil, fmt.Errorf(errMissingFingerprint)
  199. }
  200. if store.Auth.User == "" {
  201. return nil, fmt.Errorf(errMissingUser)
  202. }
  203. if store.Auth.Tenancy == "" {
  204. return nil, fmt.Errorf(errMissingTenancy)
  205. }
  206. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  207. }
  208. func (vms *VaultManagementService) Close(ctx context.Context) error {
  209. return nil
  210. }
  211. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  212. _, err := vms.KmsVaultClient.GetVault(
  213. context.Background(), keymanagement.GetVaultRequest{
  214. VaultId: &vms.vault,
  215. },
  216. )
  217. if err != nil {
  218. failure, ok := common.IsServiceError(err)
  219. if ok {
  220. code := failure.GetCode()
  221. switch code {
  222. case "NotAuthenticated":
  223. return esv1beta1.ValidationResultError, err
  224. case "NotAuthorizedOrNotFound":
  225. // User authentication was successful, but user might not have a permission like:
  226. //
  227. // Allow group external_secrets to read vaults in tenancy
  228. //
  229. // Which is fine, because to read secrets we only need:
  230. //
  231. // Allow group external_secrets to read secret-family in tenancy
  232. //
  233. // But we can't test for this permission without knowing the name of a secret
  234. return esv1beta1.ValidationResultUnknown, err
  235. default:
  236. return esv1beta1.ValidationResultError, err
  237. }
  238. } else {
  239. return esv1beta1.ValidationResultError, err
  240. }
  241. }
  242. return esv1beta1.ValidationResultReady, nil
  243. }
  244. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  245. storeSpec := store.GetSpec()
  246. oracleSpec := storeSpec.Provider.Oracle
  247. vault := oracleSpec.Vault
  248. if vault == "" {
  249. return fmt.Errorf("vault cannot be empty")
  250. }
  251. region := oracleSpec.Region
  252. if region == "" {
  253. return fmt.Errorf("region cannot be empty")
  254. }
  255. auth := oracleSpec.Auth
  256. if auth == nil {
  257. return nil
  258. }
  259. user := oracleSpec.Auth.User
  260. if user == "" {
  261. return fmt.Errorf("user cannot be empty")
  262. }
  263. tenant := oracleSpec.Auth.Tenancy
  264. if tenant == "" {
  265. return fmt.Errorf("tenant cannot be empty")
  266. }
  267. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  268. if privateKey.Name == "" {
  269. return fmt.Errorf("privateKey.name cannot be empty")
  270. }
  271. if privateKey.Key == "" {
  272. return fmt.Errorf("privateKey.key cannot be empty")
  273. }
  274. err := utils.ValidateSecretSelector(store, privateKey)
  275. if err != nil {
  276. return err
  277. }
  278. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  279. if fingerprint.Name == "" {
  280. return fmt.Errorf("fingerprint.name cannot be empty")
  281. }
  282. if fingerprint.Key == "" {
  283. return fmt.Errorf("fingerprint.key cannot be empty")
  284. }
  285. err = utils.ValidateSecretSelector(store, fingerprint)
  286. if err != nil {
  287. return err
  288. }
  289. return nil
  290. }
  291. func init() {
  292. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  293. Oracle: &esv1beta1.OracleProvider{},
  294. })
  295. }