provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. // Package conjur provides a Conjur provider for External Secrets.
  13. package conjur
  14. import (
  15. "context"
  16. "encoding/json"
  17. "fmt"
  18. "strings"
  19. "github.com/cyberark/conjur-api-go/conjurapi"
  20. "github.com/cyberark/conjur-api-go/conjurapi/authn"
  21. corev1 "k8s.io/api/core/v1"
  22. "k8s.io/client-go/kubernetes"
  23. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  24. "sigs.k8s.io/controller-runtime/pkg/client"
  25. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  26. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  27. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  28. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  29. "github.com/external-secrets/external-secrets/pkg/provider/conjur/util"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  32. )
  33. var (
  34. errConjurClient = "cannot setup new Conjur client: %w"
  35. errBadCertBundle = "caBundle failed to base64 decode: %w"
  36. errBadServiceUser = "could not get Auth.Apikey.UserRef: %w"
  37. errBadServiceAPIKey = "could not get Auth.Apikey.ApiKeyRef: %w"
  38. errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
  39. errUnableToFetchCAProviderCM = "unable to fetch Server.CAProvider ConfigMap: %w"
  40. errUnableToFetchCAProviderSecret = "unable to fetch Server.CAProvider Secret: %w"
  41. )
  42. // Client is a provider for Conjur.
  43. type Client struct {
  44. StoreKind string
  45. kube client.Client
  46. store esv1beta1.GenericStore
  47. namespace string
  48. corev1 typedcorev1.CoreV1Interface
  49. clientAPI SecretsClientFactory
  50. client SecretsClient
  51. }
  52. type Provider struct {
  53. NewConjurProvider func(context context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, corev1 typedcorev1.CoreV1Interface, clientApi SecretsClientFactory) (esv1beta1.SecretsClient, error)
  54. }
  55. // NewClient creates a new Conjur client.
  56. func (c *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  57. // controller-runtime/client does not support TokenRequest or other subresource APIs
  58. // so we need to construct our own client and use it to create a TokenRequest
  59. restCfg, err := ctrlcfg.GetConfig()
  60. if err != nil {
  61. return nil, err
  62. }
  63. clientset, err := kubernetes.NewForConfig(restCfg)
  64. if err != nil {
  65. return nil, err
  66. }
  67. return c.NewConjurProvider(ctx, store, kube, namespace, clientset.CoreV1(), &ClientAPIImpl{})
  68. }
  69. func newConjurProvider(_ context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, corev1 typedcorev1.CoreV1Interface, clientAPI SecretsClientFactory) (esv1beta1.SecretsClient, error) {
  70. return &Client{
  71. StoreKind: store.GetObjectKind().GroupVersionKind().Kind,
  72. store: store,
  73. kube: kube,
  74. namespace: namespace,
  75. corev1: corev1,
  76. clientAPI: clientAPI,
  77. }, nil
  78. }
  79. func (p *Client) GetConjurClient(ctx context.Context) (SecretsClient, error) {
  80. // if the client is initialized already, return it
  81. if p.client != nil {
  82. return p.client, nil
  83. }
  84. prov, err := util.GetConjurProvider(p.store)
  85. if err != nil {
  86. return nil, err
  87. }
  88. cert, getCertErr := p.getCA(ctx, prov)
  89. if getCertErr != nil {
  90. return nil, getCertErr
  91. }
  92. config := conjurapi.Config{
  93. ApplianceURL: prov.URL,
  94. SSLCert: cert,
  95. }
  96. if prov.Auth.APIKey != nil {
  97. config.Account = prov.Auth.APIKey.Account
  98. conjUser, secErr := resolvers.SecretKeyRef(
  99. ctx,
  100. p.kube,
  101. p.StoreKind,
  102. p.namespace, prov.Auth.APIKey.UserRef)
  103. if secErr != nil {
  104. return nil, fmt.Errorf(errBadServiceUser, secErr)
  105. }
  106. conjAPIKey, secErr := resolvers.SecretKeyRef(
  107. ctx,
  108. p.kube,
  109. p.StoreKind,
  110. p.namespace,
  111. prov.Auth.APIKey.APIKeyRef)
  112. if secErr != nil {
  113. return nil, fmt.Errorf(errBadServiceAPIKey, secErr)
  114. }
  115. conjur, newClientFromKeyError := p.clientAPI.NewClientFromKey(config,
  116. authn.LoginPair{
  117. Login: conjUser,
  118. APIKey: conjAPIKey,
  119. },
  120. )
  121. if newClientFromKeyError != nil {
  122. return nil, fmt.Errorf(errConjurClient, newClientFromKeyError)
  123. }
  124. p.client = conjur
  125. return conjur, nil
  126. } else if prov.Auth.Jwt != nil {
  127. config.Account = prov.Auth.Jwt.Account
  128. conjur, clientFromJwtError := p.newClientFromJwt(ctx, config, prov.Auth.Jwt)
  129. if clientFromJwtError != nil {
  130. return nil, fmt.Errorf(errConjurClient, clientFromJwtError)
  131. }
  132. p.client = conjur
  133. return conjur, nil
  134. } else {
  135. // Should not happen because validate func should catch this
  136. return nil, fmt.Errorf("no authentication method provided")
  137. }
  138. }
  139. // GetAllSecrets returns all secrets from the provider.
  140. // NOT IMPLEMENTED.
  141. func (p *Client) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  142. // TO be implemented
  143. return nil, fmt.Errorf("GetAllSecrets not implemented")
  144. }
  145. // GetSecret returns a single secret from the provider.
  146. func (p *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  147. conjurClient, getConjurClientError := p.GetConjurClient(ctx)
  148. if getConjurClientError != nil {
  149. return nil, getConjurClientError
  150. }
  151. secretValue, err := conjurClient.RetrieveSecret(ref.Key)
  152. if err != nil {
  153. return nil, err
  154. }
  155. return secretValue, nil
  156. }
  157. // PushSecret will write a single secret into the provider.
  158. func (p *Client) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  159. // NOT IMPLEMENTED
  160. return nil
  161. }
  162. func (p *Client) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  163. // NOT IMPLEMENTED
  164. return nil
  165. }
  166. func (p *Client) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  167. return false, fmt.Errorf("not implemented")
  168. }
  169. // GetSecretMap returns multiple k/v pairs from the provider.
  170. func (p *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  171. // Gets a secret as normal, expecting secret value to be a json object
  172. data, err := p.GetSecret(ctx, ref)
  173. if err != nil {
  174. return nil, fmt.Errorf("error getting secret %s: %w", ref.Key, err)
  175. }
  176. // Maps the json data to a string:string map
  177. kv := make(map[string]string)
  178. err = json.Unmarshal(data, &kv)
  179. if err != nil {
  180. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  181. }
  182. // Converts values in K:V pairs into bytes, while leaving keys as strings
  183. secretData := make(map[string][]byte)
  184. for k, v := range kv {
  185. secretData[k] = []byte(v)
  186. }
  187. return secretData, nil
  188. }
  189. // Close closes the provider.
  190. func (p *Client) Close(_ context.Context) error {
  191. return nil
  192. }
  193. // Validate validates the provider.
  194. func (p *Client) Validate() (esv1beta1.ValidationResult, error) {
  195. return esv1beta1.ValidationResultReady, nil
  196. }
  197. // ValidateStore validates the store.
  198. func (c *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  199. prov, err := util.GetConjurProvider(store)
  200. if err != nil {
  201. return nil, err
  202. }
  203. if prov.URL == "" {
  204. return nil, fmt.Errorf("conjur URL cannot be empty")
  205. }
  206. if prov.Auth.APIKey != nil {
  207. if prov.Auth.APIKey.Account == "" {
  208. return nil, fmt.Errorf("missing Auth.ApiKey.Account")
  209. }
  210. if prov.Auth.APIKey.UserRef == nil {
  211. return nil, fmt.Errorf("missing Auth.Apikey.UserRef")
  212. }
  213. if prov.Auth.APIKey.APIKeyRef == nil {
  214. return nil, fmt.Errorf("missing Auth.Apikey.ApiKeyRef")
  215. }
  216. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.APIKey.UserRef); err != nil {
  217. return nil, fmt.Errorf("invalid Auth.Apikey.UserRef: %w", err)
  218. }
  219. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.APIKey.APIKeyRef); err != nil {
  220. return nil, fmt.Errorf("invalid Auth.Apikey.ApiKeyRef: %w", err)
  221. }
  222. }
  223. if prov.Auth.Jwt != nil {
  224. if prov.Auth.Jwt.Account == "" {
  225. return nil, fmt.Errorf("missing Auth.Jwt.Account")
  226. }
  227. if prov.Auth.Jwt.ServiceID == "" {
  228. return nil, fmt.Errorf("missing Auth.Jwt.ServiceID")
  229. }
  230. if prov.Auth.Jwt.ServiceAccountRef == nil && prov.Auth.Jwt.SecretRef == nil {
  231. return nil, fmt.Errorf("must specify Auth.Jwt.SecretRef or Auth.Jwt.ServiceAccountRef")
  232. }
  233. if prov.Auth.Jwt.SecretRef != nil {
  234. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.Jwt.SecretRef); err != nil {
  235. return nil, fmt.Errorf("invalid Auth.Jwt.SecretRef: %w", err)
  236. }
  237. }
  238. if prov.Auth.Jwt.ServiceAccountRef != nil {
  239. if err := utils.ValidateReferentServiceAccountSelector(store, *prov.Auth.Jwt.ServiceAccountRef); err != nil {
  240. return nil, fmt.Errorf("invalid Auth.Jwt.ServiceAccountRef: %w", err)
  241. }
  242. }
  243. }
  244. // At least one auth must be configured
  245. if prov.Auth.APIKey == nil && prov.Auth.Jwt == nil {
  246. return nil, fmt.Errorf("missing Auth.* configuration")
  247. }
  248. return nil, nil
  249. }
  250. // Capabilities returns the provider Capabilities (Read, Write, ReadWrite).
  251. func (c *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  252. return esv1beta1.SecretStoreReadOnly
  253. }
  254. // configMapKeyRef returns the value of a key in a ConfigMap.
  255. func (p *Client) configMapKeyRef(ctx context.Context, cmRef *esmeta.SecretKeySelector) (string, error) {
  256. configMap := &corev1.ConfigMap{}
  257. ref := client.ObjectKey{
  258. Namespace: p.namespace,
  259. Name: cmRef.Name,
  260. }
  261. if (p.StoreKind == esv1beta1.ClusterSecretStoreKind) &&
  262. (cmRef.Namespace != nil) {
  263. ref.Namespace = *cmRef.Namespace
  264. }
  265. err := p.kube.Get(ctx, ref, configMap)
  266. if err != nil {
  267. return "", err
  268. }
  269. keyBytes, ok := configMap.Data[cmRef.Key]
  270. if !ok {
  271. return "", err
  272. }
  273. valueStr := strings.TrimSpace(keyBytes)
  274. return valueStr, nil
  275. }
  276. // getCA try retrieve the CA bundle from the provider CABundle or from the CAProvider.
  277. func (p *Client) getCA(ctx context.Context, provider *esv1beta1.ConjurProvider) (string, error) {
  278. if provider.CAProvider != nil {
  279. var ca string
  280. var err error
  281. switch provider.CAProvider.Type {
  282. case esv1beta1.CAProviderTypeConfigMap:
  283. keySelector := esmeta.SecretKeySelector{
  284. Name: provider.CAProvider.Name,
  285. Namespace: provider.CAProvider.Namespace,
  286. Key: provider.CAProvider.Key,
  287. }
  288. ca, err = p.configMapKeyRef(ctx, &keySelector)
  289. if err != nil {
  290. return "", fmt.Errorf(errUnableToFetchCAProviderCM, err)
  291. }
  292. case esv1beta1.CAProviderTypeSecret:
  293. keySelector := esmeta.SecretKeySelector{
  294. Name: provider.CAProvider.Name,
  295. Namespace: provider.CAProvider.Namespace,
  296. Key: provider.CAProvider.Key,
  297. }
  298. ca, err = resolvers.SecretKeyRef(
  299. ctx,
  300. p.kube,
  301. p.StoreKind,
  302. p.namespace,
  303. &keySelector)
  304. if err != nil {
  305. return "", fmt.Errorf(errUnableToFetchCAProviderSecret, err)
  306. }
  307. }
  308. return ca, nil
  309. }
  310. certBytes, decodeErr := utils.Decode(esv1beta1.ExternalSecretDecodeBase64, []byte(provider.CABundle))
  311. if decodeErr != nil {
  312. return "", fmt.Errorf(errBadCertBundle, decodeErr)
  313. }
  314. return string(certBytes), nil
  315. }
  316. func init() {
  317. esv1beta1.Register(&Provider{
  318. NewConjurProvider: newConjurProvider,
  319. }, &esv1beta1.SecretStoreProvider{
  320. Conjur: &esv1beta1.ConjurProvider{},
  321. })
  322. }