provider.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implieclient.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package beyondtrust
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "net/url"
  18. "strings"
  19. "time"
  20. auth "github.com/BeyondTrust/go-client-library-passwordsafe/api/authentication"
  21. "github.com/BeyondTrust/go-client-library-passwordsafe/api/logging"
  22. managed_account "github.com/BeyondTrust/go-client-library-passwordsafe/api/managed_account"
  23. "github.com/BeyondTrust/go-client-library-passwordsafe/api/secrets"
  24. "github.com/BeyondTrust/go-client-library-passwordsafe/api/utils"
  25. "github.com/cenkalti/backoff/v4"
  26. v1 "k8s.io/api/core/v1"
  27. ctrl "sigs.k8s.io/controller-runtime"
  28. "sigs.k8s.io/controller-runtime/pkg/client"
  29. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  30. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  31. esoClient "github.com/external-secrets/external-secrets/pkg/utils"
  32. )
  33. const (
  34. errNilStore = "nil store found"
  35. errMissingStoreSpec = "store is missing spec"
  36. errMissingProvider = "storeSpec is missing provider"
  37. errInvalidProvider = "invalid provider spec. Missing field in store %s"
  38. errInvalidHostURL = "invalid host URL"
  39. errNoSuchKeyFmt = "no such key in secret: %q"
  40. errInvalidRetrievalPath = "invalid retrieval path. Provide one path, separator and name"
  41. errNotImplemented = "not implemented"
  42. )
  43. var (
  44. errSecretRefAndValueConflict = errors.New("cannot specify both secret reference and value")
  45. errMissingSecretName = errors.New("must specify a secret name")
  46. errMissingSecretKey = errors.New("must specify a secret key")
  47. ESOLogger = ctrl.Log.WithName("provider").WithName("beyondtrust")
  48. maxFileSecretSizeBytes = 5000000
  49. )
  50. // Provider is a Password Safe secrets provider implementing NewClient and ValidateStore for the esv1.Provider interface.
  51. type Provider struct {
  52. apiURL string
  53. retrievaltype string
  54. authenticate auth.AuthenticationObj
  55. log logging.LogrLogger
  56. separator string
  57. }
  58. type AuthenticatorInput struct {
  59. Config *esv1.BeyondtrustProvider
  60. HTTPClientObj utils.HttpClientObj
  61. BackoffDefinition *backoff.ExponentialBackOff
  62. APIURL string
  63. APIVersion string
  64. ClientID string
  65. ClientSecret string
  66. APIKey string
  67. Logger *logging.LogrLogger
  68. RetryMaxElapsedTimeMinutes int
  69. }
  70. // Capabilities implements v1beta1.Provider.
  71. func (*Provider) Capabilities() esv1.SecretStoreCapabilities {
  72. return esv1.SecretStoreReadOnly
  73. }
  74. // Close implements v1beta1.SecretsClient.
  75. func (*Provider) Close(_ context.Context) error {
  76. return nil
  77. }
  78. // DeleteSecret implements v1beta1.SecretsClient.
  79. func (*Provider) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  80. return errors.New(errNotImplemented)
  81. }
  82. // GetSecretMap implements v1beta1.SecretsClient.
  83. func (*Provider) GetSecretMap(_ context.Context, _ esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  84. return make(map[string][]byte), errors.New(errNotImplemented)
  85. }
  86. // PushSecret implements v1beta1.SecretsClient.
  87. func (*Provider) PushSecret(_ context.Context, _ *v1.Secret, _ esv1.PushSecretData) error {
  88. return errors.New(errNotImplemented)
  89. }
  90. // Validate implements v1beta1.SecretsClient.
  91. func (p *Provider) Validate() (esv1.ValidationResult, error) {
  92. timeout := 15 * time.Second
  93. clientURL := p.apiURL
  94. if err := esoClient.NetworkValidate(clientURL, timeout); err != nil {
  95. ESOLogger.Error(err, "Network Validate", "clientURL:", clientURL)
  96. return esv1.ValidationResultError, err
  97. }
  98. return esv1.ValidationResultReady, nil
  99. }
  100. func (*Provider) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  101. return false, errors.New(errNotImplemented)
  102. }
  103. // NewClient this is where we initialize the SecretClient and return it for the controller to use.
  104. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string) (esv1.SecretsClient, error) {
  105. config := store.GetSpec().Provider.Beyondtrust
  106. logger := logging.NewLogrLogger(&ESOLogger)
  107. clientID, clientSecret, apiKey, err := loadCredentialsFromConfig(ctx, config, kube, namespace)
  108. if err != nil {
  109. return nil, fmt.Errorf("error loading credentials: %w", err)
  110. }
  111. certificate, certificateKey, err := loadCertificateFromConfig(ctx, config, kube, namespace)
  112. if err != nil {
  113. return nil, fmt.Errorf("error loading certificate: %w", err)
  114. }
  115. if err != nil {
  116. return nil, fmt.Errorf("error loading secrets: %w", err)
  117. }
  118. clientTimeOutInSeconds, separator, retryMaxElapsedTimeMinutes := getConfigValues(config)
  119. backoffDefinition := getBackoffDefinition(retryMaxElapsedTimeMinutes)
  120. params := utils.ValidationParams{
  121. ApiKey: apiKey,
  122. ClientID: clientID,
  123. ClientSecret: clientSecret,
  124. ApiUrl: &config.Server.APIURL,
  125. ApiVersion: config.Server.APIVersion,
  126. ClientTimeOutInSeconds: clientTimeOutInSeconds,
  127. Separator: &separator,
  128. VerifyCa: config.Server.VerifyCA,
  129. Logger: logger,
  130. Certificate: certificate,
  131. CertificateKey: certificateKey,
  132. RetryMaxElapsedTimeMinutes: &retryMaxElapsedTimeMinutes,
  133. MaxFileSecretSizeBytes: &maxFileSecretSizeBytes,
  134. }
  135. if err := validateInputs(params); err != nil {
  136. return nil, fmt.Errorf("error in Inputs: %w", err)
  137. }
  138. httpClient, err := utils.GetHttpClient(clientTimeOutInSeconds, config.Server.VerifyCA, certificate, certificateKey, logger)
  139. if err != nil {
  140. return nil, fmt.Errorf("error creating HTTP client: %w", err)
  141. }
  142. authenticatorInput := AuthenticatorInput{
  143. Config: config,
  144. HTTPClientObj: *httpClient,
  145. BackoffDefinition: backoffDefinition,
  146. APIURL: config.Server.APIURL,
  147. APIVersion: config.Server.APIVersion,
  148. ClientID: clientID,
  149. ClientSecret: clientSecret,
  150. APIKey: apiKey,
  151. Logger: logger,
  152. RetryMaxElapsedTimeMinutes: retryMaxElapsedTimeMinutes,
  153. }
  154. authenticate, err := getAuthenticator(authenticatorInput)
  155. if err != nil {
  156. return nil, fmt.Errorf("error authenticating: %w", err)
  157. }
  158. return &Provider{
  159. apiURL: config.Server.APIURL,
  160. retrievaltype: config.Server.RetrievalType,
  161. authenticate: *authenticate,
  162. log: *logger,
  163. separator: separator,
  164. }, nil
  165. }
  166. func loadCredentialsFromConfig(ctx context.Context, config *esv1.BeyondtrustProvider, kube client.Client, namespace string) (string, string, string, error) {
  167. var clientID, clientSecret, apiKey string
  168. var err error
  169. if config.Auth.APIKey != nil {
  170. apiKey, err = loadConfigSecret(ctx, config.Auth.APIKey, kube, namespace)
  171. if err != nil {
  172. return "", "", "", fmt.Errorf("error loading apiKey: %w", err)
  173. }
  174. } else {
  175. clientID, err = loadConfigSecret(ctx, config.Auth.ClientID, kube, namespace)
  176. if err != nil {
  177. return "", "", "", fmt.Errorf("error loading clientID: %w", err)
  178. }
  179. clientSecret, err = loadConfigSecret(ctx, config.Auth.ClientSecret, kube, namespace)
  180. if err != nil {
  181. return "", "", "", fmt.Errorf("error loading clientSecret: %w", err)
  182. }
  183. }
  184. return clientID, clientSecret, apiKey, nil
  185. }
  186. func loadCertificateFromConfig(ctx context.Context, config *esv1.BeyondtrustProvider, kube client.Client, namespace string) (string, string, error) {
  187. var certificate, certificateKey string
  188. var err error
  189. if config.Auth.Certificate != nil && config.Auth.CertificateKey != nil {
  190. certificate, err = loadConfigSecret(ctx, config.Auth.Certificate, kube, namespace)
  191. if err != nil {
  192. return "", "", fmt.Errorf("error loading Certificate: %w", err)
  193. }
  194. certificateKey, err = loadConfigSecret(ctx, config.Auth.CertificateKey, kube, namespace)
  195. if err != nil {
  196. return "", "", fmt.Errorf("error loading Certificate Key: %w", err)
  197. }
  198. }
  199. return certificate, certificateKey, nil
  200. }
  201. func getConfigValues(config *esv1.BeyondtrustProvider) (int, string, int) {
  202. clientTimeOutInSeconds := 45
  203. separator := "/"
  204. retryMaxElapsedTimeMinutes := 15
  205. if config.Server.ClientTimeOutSeconds != 0 {
  206. clientTimeOutInSeconds = config.Server.ClientTimeOutSeconds
  207. }
  208. if config.Server.Separator != "" {
  209. separator = config.Server.Separator
  210. }
  211. return clientTimeOutInSeconds, separator, retryMaxElapsedTimeMinutes
  212. }
  213. func getBackoffDefinition(retryMaxElapsedTimeMinutes int) *backoff.ExponentialBackOff {
  214. backoffDefinition := backoff.NewExponentialBackOff()
  215. backoffDefinition.InitialInterval = 1 * time.Second
  216. backoffDefinition.MaxElapsedTime = time.Duration(retryMaxElapsedTimeMinutes) * time.Minute
  217. backoffDefinition.RandomizationFactor = 0.5
  218. return backoffDefinition
  219. }
  220. func validateInputs(params utils.ValidationParams) error {
  221. return utils.ValidateInputs(params)
  222. }
  223. func getAuthenticator(input AuthenticatorInput) (*auth.AuthenticationObj, error) {
  224. parametersObj := auth.AuthenticationParametersObj{
  225. HTTPClient: input.HTTPClientObj,
  226. BackoffDefinition: input.BackoffDefinition,
  227. EndpointURL: input.APIURL,
  228. APIVersion: input.APIVersion,
  229. ApiKey: input.APIKey,
  230. Logger: input.Logger,
  231. RetryMaxElapsedTimeSeconds: input.RetryMaxElapsedTimeMinutes,
  232. }
  233. if input.Config.Auth.APIKey != nil {
  234. parametersObj.ApiKey = input.APIKey
  235. return auth.AuthenticateUsingApiKey(parametersObj)
  236. }
  237. parametersObj.ClientID = input.ClientID
  238. parametersObj.ClientSecret = input.ClientSecret
  239. return auth.Authenticate(parametersObj)
  240. }
  241. func loadConfigSecret(ctx context.Context, ref *esv1.BeyondTrustProviderSecretRef, kube client.Client, defaultNamespace string) (string, error) {
  242. if ref.SecretRef == nil {
  243. return ref.Value, nil
  244. }
  245. if err := validateSecretRef(ref); err != nil {
  246. return "", err
  247. }
  248. namespace := defaultNamespace
  249. if ref.SecretRef.Namespace != nil {
  250. namespace = *ref.SecretRef.Namespace
  251. }
  252. ESOLogger.Info("using k8s secret", "name:", ref.SecretRef.Name, "namespace:", namespace)
  253. objKey := client.ObjectKey{Namespace: namespace, Name: ref.SecretRef.Name}
  254. secret := v1.Secret{}
  255. err := kube.Get(ctx, objKey, &secret)
  256. if err != nil {
  257. return "", err
  258. }
  259. value, ok := secret.Data[ref.SecretRef.Key]
  260. if !ok {
  261. return "", fmt.Errorf(errNoSuchKeyFmt, ref.SecretRef.Key)
  262. }
  263. return string(value), nil
  264. }
  265. func validateSecretRef(ref *esv1.BeyondTrustProviderSecretRef) error {
  266. if ref.SecretRef != nil {
  267. if ref.Value != "" {
  268. return errSecretRefAndValueConflict
  269. }
  270. if ref.SecretRef.Name == "" {
  271. return errMissingSecretName
  272. }
  273. if ref.SecretRef.Key == "" {
  274. return errMissingSecretKey
  275. }
  276. }
  277. return nil
  278. }
  279. func (p *Provider) GetAllSecrets(_ context.Context, _ esv1.ExternalSecretFind) (map[string][]byte, error) {
  280. return nil, errors.New("GetAllSecrets not implemented")
  281. }
  282. // GetSecret reads the secret from the Password Safe server and returns it. The controller uses the value here to
  283. // create the Kubernetes secret.
  284. func (p *Provider) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  285. managedAccountType := !strings.EqualFold(p.retrievaltype, "SECRET")
  286. retrievalPaths := utils.ValidatePaths([]string{ref.Key}, managedAccountType, p.separator, &p.log)
  287. if len(retrievalPaths) != 1 {
  288. return nil, errors.New(errInvalidRetrievalPath)
  289. }
  290. retrievalPath := retrievalPaths[0]
  291. _, err := p.authenticate.GetPasswordSafeAuthentication()
  292. if err != nil {
  293. return nil, fmt.Errorf("error getting authentication: %w", err)
  294. }
  295. managedFetch := func() (string, error) {
  296. ESOLogger.Info("retrieve managed account value", "retrievalPath:", retrievalPath)
  297. manageAccountObj, _ := managed_account.NewManagedAccountObj(p.authenticate, &p.log)
  298. return manageAccountObj.GetSecret(retrievalPath, p.separator)
  299. }
  300. unmanagedFetch := func() (string, error) {
  301. ESOLogger.Info("retrieve secrets safe value", "retrievalPath:", retrievalPath)
  302. secretObj, _ := secrets.NewSecretObj(p.authenticate, &p.log, maxFileSecretSizeBytes)
  303. return secretObj.GetSecret(retrievalPath, p.separator)
  304. }
  305. fetch := unmanagedFetch
  306. if managedAccountType {
  307. fetch = managedFetch
  308. }
  309. returnSecret, err := fetch()
  310. if err != nil {
  311. if serr := p.authenticate.SignOut(); serr != nil {
  312. return nil, errors.Join(err, serr)
  313. }
  314. return nil, fmt.Errorf("error getting secret/managed account: %w", err)
  315. }
  316. return []byte(returnSecret), nil
  317. }
  318. // ValidateStore validates the store configuration to prevent unexpected errors.
  319. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  320. if store == nil {
  321. return nil, errors.New(errNilStore)
  322. }
  323. spec := store.GetSpec()
  324. if spec == nil {
  325. return nil, errors.New(errMissingStoreSpec)
  326. }
  327. if spec.Provider == nil {
  328. return nil, errors.New(errMissingProvider)
  329. }
  330. provider := spec.Provider.Beyondtrust
  331. if provider == nil {
  332. return nil, fmt.Errorf(errInvalidProvider, store.GetObjectMeta().String())
  333. }
  334. apiURL, err := url.Parse(provider.Server.APIURL)
  335. if err != nil {
  336. return nil, errors.New(errInvalidHostURL)
  337. }
  338. if provider.Auth.ClientID.SecretRef != nil {
  339. return nil, err
  340. }
  341. if provider.Auth.ClientSecret.SecretRef != nil {
  342. return nil, err
  343. }
  344. if apiURL.Host == "" {
  345. return nil, errors.New(errInvalidHostURL)
  346. }
  347. return nil, nil
  348. }
  349. // registers the provider object to process on each reconciliation loop.
  350. func init() {
  351. esv1.Register(&Provider{}, &esv1.SecretStoreProvider{
  352. Beyondtrust: &esv1.BeyondtrustProvider{},
  353. }, esv1.MaintenanceStatusMaintained)
  354. }