oracle.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "github.com/oracle/oci-go-sdk/v45/common"
  18. vault "github.com/oracle/oci-go-sdk/v45/vault"
  19. "github.com/tidwall/gjson"
  20. corev1 "k8s.io/api/core/v1"
  21. "k8s.io/apimachinery/pkg/types"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  24. "github.com/external-secrets/external-secrets/pkg/provider"
  25. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  26. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  27. "github.com/external-secrets/external-secrets/pkg/utils"
  28. )
  29. const (
  30. VaultEndpointEnv = "ORACLE_VAULT_ENDPOINT"
  31. STSEndpointEnv = "ORACLE_STS_ENDPOINT"
  32. SVMEndpointEnv = "ORACLE_SVM_ENDPOINT"
  33. errOracleClient = "cannot setup new oracle client: %w"
  34. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  35. errUninitalizedOracleProvider = "provider oracle is not initialized"
  36. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  37. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  38. errMissingPK = "missing PrivateKey"
  39. errMissingUser = "missing User ID"
  40. errMissingTenancy = "missing Tenancy ID"
  41. errMissingRegion = "missing Region"
  42. errMissingFingerprint = "missing Fingerprint"
  43. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  44. errMissingKey = "missing Key in secret: %s"
  45. errInvalidSecret = "invalid secret received. no secret string nor binary for key: %s"
  46. )
  47. type client struct {
  48. kube kclient.Client
  49. store *esv1alpha1.OracleProvider
  50. namespace string
  51. storeKind string
  52. tenancy string
  53. user string
  54. region string
  55. fingerprint string
  56. privateKey string
  57. }
  58. type VaultManagementService struct {
  59. Client VMInterface
  60. }
  61. type VMInterface interface {
  62. GetSecret(ctx context.Context, request vault.GetSecretRequest) (response vault.GetSecretResponse, err error)
  63. }
  64. func (c *client) setAuth(ctx context.Context) error {
  65. credentialsSecret := &corev1.Secret{}
  66. credentialsSecretName := c.store.Auth.SecretRef.PrivateKey.Name
  67. if credentialsSecretName == "" {
  68. return fmt.Errorf(errORACLECredSecretName)
  69. }
  70. objectKey := types.NamespacedName{
  71. Name: credentialsSecretName,
  72. Namespace: c.namespace,
  73. }
  74. // only ClusterStore is allowed to set namespace (and then it's required)
  75. if c.storeKind == esv1alpha1.ClusterSecretStoreKind {
  76. if c.store.Auth.SecretRef.PrivateKey.Namespace == nil {
  77. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  78. }
  79. objectKey.Namespace = *c.store.Auth.SecretRef.PrivateKey.Namespace
  80. }
  81. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  82. if err != nil {
  83. return fmt.Errorf(errFetchSAKSecret, err)
  84. }
  85. c.privateKey = string(credentialsSecret.Data[c.store.Auth.SecretRef.PrivateKey.Key])
  86. if c.privateKey == "" {
  87. return fmt.Errorf(errMissingPK)
  88. }
  89. c.fingerprint = string(credentialsSecret.Data[c.store.Auth.SecretRef.Fingerprint.Key])
  90. if c.fingerprint == "" {
  91. return fmt.Errorf(errMissingFingerprint)
  92. }
  93. c.user = c.store.User
  94. if c.user == "" {
  95. return fmt.Errorf(errMissingUser)
  96. }
  97. c.tenancy = c.store.Tenancy
  98. if c.tenancy == "" {
  99. return fmt.Errorf(errMissingTenancy)
  100. }
  101. c.region = c.store.Region
  102. if c.region == "" {
  103. return fmt.Errorf(errMissingRegion)
  104. }
  105. return nil
  106. }
  107. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  108. if utils.IsNil(vms.Client) {
  109. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  110. }
  111. vmsRequest := vault.GetSecretRequest{
  112. SecretId: &ref.Key,
  113. }
  114. secretOut, err := vms.Client.GetSecret(context.Background(), vmsRequest)
  115. if err != nil {
  116. return nil, util.SanitizeErr(err)
  117. }
  118. if ref.Property == "" {
  119. if *secretOut.SecretName != "" {
  120. return []byte(*secretOut.SecretName), nil
  121. }
  122. return nil, fmt.Errorf(errInvalidSecret, ref.Key)
  123. }
  124. var payload *string
  125. if secretOut.SecretName != nil {
  126. payload = secretOut.SecretName
  127. }
  128. payloadval := *payload
  129. val := gjson.Get(payloadval, ref.Property)
  130. if !val.Exists() {
  131. return nil, fmt.Errorf(errMissingKey, ref.Key)
  132. }
  133. return []byte(val.String()), nil
  134. }
  135. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  136. data, err := vms.GetSecret(ctx, ref)
  137. if err != nil {
  138. return nil, err
  139. }
  140. kv := make(map[string]string)
  141. err = json.Unmarshal(data, &kv)
  142. if err != nil {
  143. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  144. }
  145. secretData := make(map[string][]byte)
  146. for k, v := range kv {
  147. secretData[k] = []byte(v)
  148. }
  149. return secretData, nil
  150. }
  151. // NewClient constructs a new secrets client based on the provided store.
  152. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  153. storeSpec := store.GetSpec()
  154. oracleSpec := storeSpec.Provider.Oracle
  155. oracleStore := &client{
  156. kube: kube,
  157. store: oracleSpec,
  158. namespace: namespace,
  159. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  160. }
  161. if err := oracleStore.setAuth(ctx); err != nil {
  162. return nil, err
  163. }
  164. oracleTenancy := oracleStore.tenancy
  165. oracleUser := oracleStore.user
  166. oracleRegion := oracleStore.region
  167. oracleFingerprint := oracleStore.fingerprint
  168. oraclePrivateKey := oracleStore.privateKey
  169. configurationProvider := common.NewRawConfigurationProvider(oracleTenancy, oracleUser, oracleRegion, oracleFingerprint, oraclePrivateKey, nil)
  170. vaultManagementService, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  171. if err != nil {
  172. return nil, fmt.Errorf(errOracleClient, err)
  173. }
  174. vms.Client = vaultManagementService
  175. return vms, nil
  176. }
  177. func (vms *VaultManagementService) Close(ctx context.Context) error {
  178. return nil
  179. }
  180. func init() {
  181. schema.Register(&VaultManagementService{}, &esv1alpha1.SecretStoreProvider{
  182. Oracle: &esv1alpha1.OracleProvider{},
  183. })
  184. }