onepassword.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package onepassword
  13. import (
  14. "context"
  15. "fmt"
  16. "net/url"
  17. "sort"
  18. "github.com/1Password/connect-sdk-go/connect"
  19. "github.com/1Password/connect-sdk-go/onepassword"
  20. corev1 "k8s.io/api/core/v1"
  21. "k8s.io/apimachinery/pkg/types"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. "github.com/external-secrets/external-secrets/pkg/find"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. )
  27. const (
  28. userAgent = "external-secrets"
  29. errOnePasswordStore = "received invalid 1Password SecretStore resource: %w"
  30. errOnePasswordStoreNilSpec = "nil spec"
  31. errOnePasswordStoreNilSpecProvider = "nil spec.provider"
  32. errOnePasswordStoreNilSpecProviderOnePassword = "nil spec.provider.onepassword"
  33. errOnePasswordStoreMissingRefName = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.name"
  34. errOnePasswordStoreMissingRefKey = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.key"
  35. errOnePasswordStoreAtLeastOneVault = "must be at least one vault: spec.provider.onepassword.vaults"
  36. errOnePasswordStoreInvalidConnectHost = "unable to parse URL: spec.provider.onepassword.connectHost: %w"
  37. errOnePasswordStoreNonUniqueVaultNumbers = "vault order numbers must be unique"
  38. errFetchK8sSecret = "could not fetch ConnectToken Secret: %w"
  39. errMissingToken = "missing Secret Token"
  40. errGetVault = "error finding 1Password Vault: %w"
  41. errExpectedOneVault = "expected one 1Password Vault matching %w"
  42. errExpectedOneItem = "expected one 1Password Item matching %w"
  43. errGetItem = "error finding 1Password Item: %w"
  44. errKeyNotFound = "key not found in 1Password Vaults: %w"
  45. errDocumentNotFound = "error finding 1Password Document: %w"
  46. errExpectedOneField = "expected one 1Password ItemField matching %w"
  47. errTagsNotImplemented = "'find.tags' is not implemented in the 1Password provider"
  48. errVersionNotImplemented = "'remoteRef.version' is not implemented in the 1Password provider"
  49. documentCategory = "DOCUMENT"
  50. fieldsWithLabelFormat = "'%s' in '%s', got %d"
  51. incorrectCountFormat = "'%s', got %d"
  52. )
  53. // ProviderOnePassword is a provider for 1Password.
  54. type ProviderOnePassword struct {
  55. vaults map[string]int
  56. client connect.Client
  57. }
  58. // https://github.com/external-secrets/external-secrets/issues/644
  59. var _ esv1beta1.SecretsClient = &ProviderOnePassword{}
  60. var _ esv1beta1.Provider = &ProviderOnePassword{}
  61. // NewClient constructs a 1Password Provider.
  62. func (provider *ProviderOnePassword) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  63. config := store.GetSpec().Provider.OnePassword
  64. credentialsSecret := &corev1.Secret{}
  65. objectKey := types.NamespacedName{
  66. Name: config.Auth.SecretRef.ConnectToken.Name,
  67. Namespace: namespace,
  68. }
  69. // only ClusterSecretStore is allowed to set namespace (and then it's required)
  70. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  71. objectKey.Namespace = *config.Auth.SecretRef.ConnectToken.Namespace
  72. }
  73. err := kube.Get(ctx, objectKey, credentialsSecret)
  74. if err != nil {
  75. return nil, fmt.Errorf(errFetchK8sSecret, err)
  76. }
  77. token := credentialsSecret.Data[config.Auth.SecretRef.ConnectToken.Key]
  78. if (token == nil) || (len(token) == 0) {
  79. return nil, fmt.Errorf(errMissingToken)
  80. }
  81. provider.client = connect.NewClientWithUserAgent(config.ConnectHost, string(token), userAgent)
  82. provider.vaults = config.Vaults
  83. return provider, nil
  84. }
  85. // ValidateStore checks if the provided store is valid.
  86. func (provider *ProviderOnePassword) ValidateStore(store esv1beta1.GenericStore) error {
  87. return validateStore(store)
  88. }
  89. func validateStore(store esv1beta1.GenericStore) error {
  90. // check nils
  91. storeSpec := store.GetSpec()
  92. if storeSpec == nil {
  93. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpec))
  94. }
  95. if storeSpec.Provider == nil {
  96. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProvider))
  97. }
  98. if storeSpec.Provider.OnePassword == nil {
  99. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProviderOnePassword))
  100. }
  101. // check mandatory fields
  102. config := storeSpec.Provider.OnePassword
  103. if config.Auth.SecretRef.ConnectToken.Name == "" {
  104. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefName))
  105. }
  106. if config.Auth.SecretRef.ConnectToken.Key == "" {
  107. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefKey))
  108. }
  109. // check namespace compared to kind
  110. if err := utils.ValidateSecretSelector(store, config.Auth.SecretRef.ConnectToken); err != nil {
  111. return fmt.Errorf(errOnePasswordStore, err)
  112. }
  113. // check at least one vault
  114. if len(config.Vaults) == 0 {
  115. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreAtLeastOneVault))
  116. }
  117. // ensure vault numbers are unique
  118. if !hasUniqueVaultNumbers(config.Vaults) {
  119. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNonUniqueVaultNumbers))
  120. }
  121. // check valid URL
  122. if _, err := url.Parse(config.ConnectHost); err != nil {
  123. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreInvalidConnectHost, err))
  124. }
  125. return nil
  126. }
  127. // GetSecret returns a single secret from the provider.
  128. func (provider *ProviderOnePassword) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  129. if ref.Version != "" {
  130. return nil, fmt.Errorf(errVersionNotImplemented)
  131. }
  132. item, err := provider.findItem(ref.Key)
  133. if err != nil {
  134. return nil, err
  135. }
  136. // handle files
  137. if item.Category == documentCategory {
  138. // default to the first file when ref.Property is empty
  139. return provider.getFile(item, ref.Property)
  140. }
  141. // handle fields
  142. return provider.getField(item, ref.Property)
  143. }
  144. // Validate checks if the client is configured correctly
  145. // to be able to retrieve secrets from the provider.
  146. func (provider *ProviderOnePassword) Validate() (esv1beta1.ValidationResult, error) {
  147. for vaultName := range provider.vaults {
  148. _, err := provider.client.GetItems(vaultName)
  149. if err != nil {
  150. return esv1beta1.ValidationResultError, err
  151. }
  152. }
  153. return esv1beta1.ValidationResultReady, nil
  154. }
  155. // GetSecretMap returns multiple k/v pairs from the provider, for dataFrom.extract.
  156. func (provider *ProviderOnePassword) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  157. if ref.Version != "" {
  158. return nil, fmt.Errorf(errVersionNotImplemented)
  159. }
  160. item, err := provider.findItem(ref.Key)
  161. if err != nil {
  162. return nil, err
  163. }
  164. // handle files
  165. if item.Category == documentCategory {
  166. return provider.getFiles(item, ref.Property)
  167. }
  168. // handle fields
  169. return provider.getFields(item, ref.Property)
  170. }
  171. // GetAllSecrets syncs multiple 1Password Items into a single Kubernetes Secret, for dataFrom.find.
  172. func (provider *ProviderOnePassword) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  173. if ref.Tags != nil {
  174. return nil, fmt.Errorf(errTagsNotImplemented)
  175. }
  176. secretData := make(map[string][]byte)
  177. sortedVaults := sortVaults(provider.vaults)
  178. for _, vaultName := range sortedVaults {
  179. vaults, err := provider.client.GetVaultsByTitle(vaultName)
  180. if err != nil {
  181. return nil, fmt.Errorf(errGetVault, err)
  182. }
  183. if len(vaults) != 1 {
  184. return nil, fmt.Errorf(errExpectedOneVault, fmt.Errorf(incorrectCountFormat, vaultName, len(vaults)))
  185. }
  186. err = provider.getAllForVault(vaults[0].ID, ref, secretData)
  187. if err != nil {
  188. return nil, err
  189. }
  190. }
  191. return secretData, nil
  192. }
  193. // Close closes the client connection.
  194. func (provider *ProviderOnePassword) Close(ctx context.Context) error {
  195. return nil
  196. }
  197. func (provider *ProviderOnePassword) findItem(name string) (*onepassword.Item, error) {
  198. sortedVaults := sortVaults(provider.vaults)
  199. for _, vaultName := range sortedVaults {
  200. vaults, err := provider.client.GetVaultsByTitle(vaultName)
  201. if err != nil {
  202. return nil, fmt.Errorf(errGetVault, err)
  203. }
  204. if len(vaults) != 1 {
  205. return nil, fmt.Errorf(errExpectedOneVault, fmt.Errorf(incorrectCountFormat, vaultName, len(vaults)))
  206. }
  207. // use GetItemsByTitle instead of GetItemByTitle in order to handle length cases
  208. items, err := provider.client.GetItemsByTitle(name, vaults[0].ID)
  209. if err != nil {
  210. return nil, fmt.Errorf(errGetItem, err)
  211. }
  212. switch {
  213. case len(items) == 1:
  214. return provider.client.GetItem(items[0].ID, items[0].Vault.ID)
  215. case len(items) > 1:
  216. return nil, fmt.Errorf(errExpectedOneItem, fmt.Errorf(incorrectCountFormat, name, len(items)))
  217. }
  218. }
  219. return nil, fmt.Errorf(errKeyNotFound, fmt.Errorf("%s in: %v", name, provider.vaults))
  220. }
  221. func (provider *ProviderOnePassword) getField(item *onepassword.Item, property string) ([]byte, error) {
  222. // default to a field labeled "password"
  223. fieldLabel := "password"
  224. if property != "" {
  225. fieldLabel = property
  226. }
  227. if length := countFieldsWithLabel(fieldLabel, item.Fields); length != 1 {
  228. return nil, fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, fieldLabel, item.Title, length))
  229. }
  230. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  231. value := ""
  232. for _, field := range item.Fields {
  233. if field.Label == fieldLabel {
  234. value = field.Value
  235. break
  236. }
  237. }
  238. return []byte(value), nil
  239. }
  240. func (provider *ProviderOnePassword) getFields(item *onepassword.Item, property string) (map[string][]byte, error) {
  241. secretData := make(map[string][]byte)
  242. for _, field := range item.Fields {
  243. if property != "" && field.Label != property {
  244. continue
  245. }
  246. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  247. return nil, fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, field.Label, item.Title, length))
  248. }
  249. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  250. secretData[field.Label] = []byte(field.Value)
  251. }
  252. return secretData, nil
  253. }
  254. func (provider *ProviderOnePassword) getAllFields(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  255. i, err := provider.client.GetItem(item.ID, item.Vault.ID)
  256. if err != nil {
  257. return fmt.Errorf(errGetItem, err)
  258. }
  259. item = *i
  260. for _, field := range item.Fields {
  261. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  262. return fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, field.Label, item.Title, length))
  263. }
  264. if ref.Name != nil {
  265. matcher, err := find.New(*ref.Name)
  266. if err != nil {
  267. return err
  268. }
  269. if !matcher.MatchName(field.Label) {
  270. continue
  271. }
  272. }
  273. if _, ok := secretData[field.Label]; !ok {
  274. secretData[field.Label] = []byte(field.Value)
  275. }
  276. }
  277. return nil
  278. }
  279. func (provider *ProviderOnePassword) getFile(item *onepassword.Item, property string) ([]byte, error) {
  280. for _, file := range item.Files {
  281. // default to the first file when ref.Property is empty
  282. if file.Name == property || property == "" {
  283. contents, err := provider.client.GetFileContent(file)
  284. if err != nil {
  285. return nil, err
  286. }
  287. return contents, nil
  288. }
  289. }
  290. return nil, fmt.Errorf(errDocumentNotFound, fmt.Errorf("'%s', '%s'", item.Title, property))
  291. }
  292. func (provider *ProviderOnePassword) getFiles(item *onepassword.Item, property string) (map[string][]byte, error) {
  293. secretData := make(map[string][]byte)
  294. for _, file := range item.Files {
  295. if property != "" && file.Name != property {
  296. continue
  297. }
  298. contents, err := provider.client.GetFileContent(file)
  299. if err != nil {
  300. return nil, err
  301. }
  302. secretData[file.Name] = contents
  303. }
  304. return secretData, nil
  305. }
  306. func (provider *ProviderOnePassword) getAllFiles(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  307. for _, file := range item.Files {
  308. if ref.Name != nil {
  309. matcher, err := find.New(*ref.Name)
  310. if err != nil {
  311. return err
  312. }
  313. if !matcher.MatchName(file.Name) {
  314. continue
  315. }
  316. }
  317. if _, ok := secretData[file.Name]; !ok {
  318. contents, err := provider.client.GetFileContent(file)
  319. if err != nil {
  320. return err
  321. }
  322. secretData[file.Name] = contents
  323. }
  324. }
  325. return nil
  326. }
  327. func (provider *ProviderOnePassword) getAllForVault(vaultID string, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  328. items, err := provider.client.GetItems(vaultID)
  329. if err != nil {
  330. return fmt.Errorf(errGetItem, err)
  331. }
  332. for _, item := range items {
  333. if ref.Path != nil && *ref.Path != item.Title {
  334. continue
  335. }
  336. // handle files
  337. if item.Category == documentCategory {
  338. err = provider.getAllFiles(item, ref, secretData)
  339. if err != nil {
  340. return err
  341. }
  342. continue
  343. }
  344. // handle fields
  345. err = provider.getAllFields(item, ref, secretData)
  346. if err != nil {
  347. return err
  348. }
  349. }
  350. return nil
  351. }
  352. func countFieldsWithLabel(fieldLabel string, fields []*onepassword.ItemField) int {
  353. count := 0
  354. for _, field := range fields {
  355. if field.Label == fieldLabel {
  356. count++
  357. }
  358. }
  359. return count
  360. }
  361. type orderedVault struct {
  362. Name string
  363. Order int
  364. }
  365. type orderedVaultList []orderedVault
  366. func (list orderedVaultList) Len() int { return len(list) }
  367. func (list orderedVaultList) Swap(i, j int) { list[i], list[j] = list[j], list[i] }
  368. func (list orderedVaultList) Less(i, j int) bool { return list[i].Order < list[j].Order }
  369. func sortVaults(vaults map[string]int) []string {
  370. list := make(orderedVaultList, len(vaults))
  371. index := 0
  372. for key, value := range vaults {
  373. list[index] = orderedVault{key, value}
  374. index++
  375. }
  376. sort.Sort(list)
  377. sortedVaults := []string{}
  378. for _, item := range list {
  379. sortedVaults = append(sortedVaults, item.Name)
  380. }
  381. return sortedVaults
  382. }
  383. func hasUniqueVaultNumbers(vaults map[string]int) bool {
  384. unique := make([]int, 0, len(vaults))
  385. tracker := make(map[int]bool)
  386. for _, number := range vaults {
  387. if _, ok := tracker[number]; !ok {
  388. tracker[number] = true
  389. unique = append(unique, number)
  390. }
  391. }
  392. return len(vaults) == len(unique)
  393. }
  394. func init() {
  395. esv1beta1.Register(&ProviderOnePassword{}, &esv1beta1.SecretStoreProvider{
  396. OnePassword: &esv1beta1.OnePasswordProvider{},
  397. })
  398. }