secretsmanager.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package secretmanager
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "strconv"
  19. "strings"
  20. "sync"
  21. secretmanager "cloud.google.com/go/secretmanager/apiv1"
  22. "github.com/googleapis/gax-go/v2"
  23. "github.com/tidwall/gjson"
  24. "golang.org/x/oauth2"
  25. "golang.org/x/oauth2/google"
  26. "google.golang.org/api/iterator"
  27. "google.golang.org/api/option"
  28. secretmanagerpb "google.golang.org/genproto/googleapis/cloud/secretmanager/v1"
  29. v1 "k8s.io/api/core/v1"
  30. "k8s.io/apimachinery/pkg/types"
  31. ctrl "sigs.k8s.io/controller-runtime"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  34. "github.com/external-secrets/external-secrets/pkg/find"
  35. "github.com/external-secrets/external-secrets/pkg/utils"
  36. )
  37. const (
  38. CloudPlatformRole = "https://www.googleapis.com/auth/cloud-platform"
  39. defaultVersion = "latest"
  40. errGCPSMStore = "received invalid GCPSM SecretStore resource"
  41. errUnableGetCredentials = "unable to get credentials: %w"
  42. errClientClose = "unable to close SecretManager client: %w"
  43. errMissingStoreSpec = "invalid: missing store spec"
  44. errInvalidClusterStoreMissingSAKNamespace = "invalid ClusterSecretStore: missing GCP SecretAccessKey Namespace"
  45. errInvalidClusterStoreMissingSANamespace = "invalid ClusterSecretStore: missing GCP Service Account Namespace"
  46. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  47. errMissingSAK = "missing SecretAccessKey"
  48. errUnableProcessJSONCredentials = "failed to process the provided JSON credentials: %w"
  49. errUnableCreateGCPSMClient = "failed to create GCP secretmanager client: %w"
  50. errUninitalizedGCPProvider = "provider GCP is not initialized"
  51. errClientGetSecretAccess = "unable to access Secret from SecretManager Client: %w"
  52. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  53. errInvalidStore = "invalid store"
  54. errInvalidStoreSpec = "invalid store spec"
  55. errInvalidStoreProv = "invalid store provider"
  56. errInvalidGCPProv = "invalid gcp secrets manager provider"
  57. errInvalidAuthSecretRef = "invalid auth secret ref: %w"
  58. errInvalidWISARef = "invalid workload identity service account reference: %w"
  59. errUnexpectedFindOperator = "unexpected find operator"
  60. )
  61. var log = ctrl.Log.WithName("provider").WithName("gcp").WithName("secretsmanager")
  62. type GoogleSecretManagerClient interface {
  63. AccessSecretVersion(ctx context.Context, req *secretmanagerpb.AccessSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.AccessSecretVersionResponse, error)
  64. ListSecrets(ctx context.Context, req *secretmanagerpb.ListSecretsRequest, opts ...gax.CallOption) *secretmanager.SecretIterator
  65. Close() error
  66. }
  67. /*
  68. Currently, GCPSM client has a limitation around how concurrent connections work
  69. This limitation causes memory leaks due to random disconnects from living clients
  70. and also payload switches when sending a call (such as using a credential from one
  71. thread to ask secrets from another thread).
  72. A Mutex was implemented to make sure only one connection can be in place at a time.
  73. */
  74. var useMu = sync.Mutex{}
  75. // https://github.com/external-secrets/external-secrets/issues/644
  76. var _ esv1beta1.SecretsClient = &ProviderGCP{}
  77. var _ esv1beta1.Provider = &ProviderGCP{}
  78. // ProviderGCP is a provider for GCP Secret Manager.
  79. type ProviderGCP struct {
  80. projectID string
  81. SecretManagerClient GoogleSecretManagerClient
  82. gClient *gClient
  83. }
  84. type gClient struct {
  85. kube kclient.Client
  86. store *esv1beta1.GCPSMProvider
  87. namespace string
  88. storeKind string
  89. workloadIdentity *workloadIdentity
  90. }
  91. func (c *gClient) getTokenSource(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (oauth2.TokenSource, error) {
  92. ts, err := serviceAccountTokenSource(ctx, store, kube, namespace)
  93. if ts != nil || err != nil {
  94. return ts, err
  95. }
  96. ts, err = c.workloadIdentity.TokenSource(ctx, store, kube, namespace)
  97. if ts != nil || err != nil {
  98. return ts, err
  99. }
  100. return google.DefaultTokenSource(ctx, CloudPlatformRole)
  101. }
  102. func (c *gClient) Close() error {
  103. return c.workloadIdentity.Close()
  104. }
  105. func serviceAccountTokenSource(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (oauth2.TokenSource, error) {
  106. spec := store.GetSpec()
  107. if spec == nil || spec.Provider.GCPSM == nil {
  108. return nil, fmt.Errorf(errMissingStoreSpec)
  109. }
  110. sr := spec.Provider.GCPSM.Auth.SecretRef
  111. if sr == nil {
  112. return nil, nil
  113. }
  114. storeKind := store.GetObjectKind().GroupVersionKind().Kind
  115. credentialsSecret := &v1.Secret{}
  116. credentialsSecretName := sr.SecretAccessKey.Name
  117. objectKey := types.NamespacedName{
  118. Name: credentialsSecretName,
  119. Namespace: namespace,
  120. }
  121. // only ClusterStore is allowed to set namespace (and then it's required)
  122. if storeKind == esv1beta1.ClusterSecretStoreKind {
  123. if credentialsSecretName != "" && sr.SecretAccessKey.Namespace == nil {
  124. return nil, fmt.Errorf(errInvalidClusterStoreMissingSAKNamespace)
  125. } else if credentialsSecretName != "" {
  126. objectKey.Namespace = *sr.SecretAccessKey.Namespace
  127. }
  128. }
  129. err := kube.Get(ctx, objectKey, credentialsSecret)
  130. if err != nil {
  131. return nil, fmt.Errorf(errFetchSAKSecret, err)
  132. }
  133. credentials := credentialsSecret.Data[sr.SecretAccessKey.Key]
  134. if (credentials == nil) || (len(credentials) == 0) {
  135. return nil, fmt.Errorf(errMissingSAK)
  136. }
  137. config, err := google.JWTConfigFromJSON(credentials, CloudPlatformRole)
  138. if err != nil {
  139. return nil, fmt.Errorf(errUnableProcessJSONCredentials, err)
  140. }
  141. return config.TokenSource(ctx), nil
  142. }
  143. // NewClient constructs a GCP Provider.
  144. func (sm *ProviderGCP) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  145. storeSpec := store.GetSpec()
  146. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.GCPSM == nil {
  147. return nil, fmt.Errorf(errGCPSMStore)
  148. }
  149. storeSpecGCPSM := storeSpec.Provider.GCPSM
  150. useMu.Lock()
  151. wi, err := newWorkloadIdentity(ctx)
  152. if err != nil {
  153. useMu.Unlock()
  154. return nil, fmt.Errorf("unable to initialize workload identity")
  155. }
  156. cliStore := gClient{
  157. kube: kube,
  158. store: storeSpecGCPSM,
  159. namespace: namespace,
  160. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  161. workloadIdentity: wi,
  162. }
  163. sm.gClient = &cliStore
  164. defer func() {
  165. // closes IAMClient to prevent gRPC connection leak in case of an error.
  166. if sm.SecretManagerClient == nil {
  167. _ = sm.gClient.Close()
  168. }
  169. }()
  170. sm.projectID = cliStore.store.ProjectID
  171. ts, err := cliStore.getTokenSource(ctx, store, kube, namespace)
  172. if err != nil {
  173. useMu.Unlock()
  174. return nil, fmt.Errorf(errUnableCreateGCPSMClient, err)
  175. }
  176. // check if we can get credentials
  177. _, err = ts.Token()
  178. if err != nil {
  179. useMu.Unlock()
  180. return nil, fmt.Errorf(errUnableGetCredentials, err)
  181. }
  182. clientGCPSM, err := secretmanager.NewClient(ctx, option.WithTokenSource(ts))
  183. if err != nil {
  184. useMu.Unlock()
  185. return nil, fmt.Errorf(errUnableCreateGCPSMClient, err)
  186. }
  187. sm.SecretManagerClient = clientGCPSM
  188. return sm, nil
  189. }
  190. // GetAllSecrets syncs multiple secrets from gcp provider into a single Kubernetes Secret.
  191. func (sm *ProviderGCP) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  192. if ref.Name != nil {
  193. return sm.findByName(ctx, ref)
  194. }
  195. if len(ref.Tags) > 0 {
  196. return sm.findByTags(ctx, ref)
  197. }
  198. return nil, errors.New(errUnexpectedFindOperator)
  199. }
  200. func (sm *ProviderGCP) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  201. // regex matcher
  202. matcher, err := find.New(*ref.Name)
  203. if err != nil {
  204. return nil, err
  205. }
  206. req := &secretmanagerpb.ListSecretsRequest{
  207. Parent: fmt.Sprintf("projects/%s", sm.projectID),
  208. }
  209. if ref.Path != nil {
  210. req.Filter = fmt.Sprintf("name:%s", *ref.Path)
  211. }
  212. // Call the API.
  213. it := sm.SecretManagerClient.ListSecrets(ctx, req)
  214. secretMap := make(map[string][]byte)
  215. for {
  216. resp, err := it.Next()
  217. if errors.Is(err, iterator.Done) {
  218. break
  219. }
  220. if err != nil {
  221. return nil, fmt.Errorf("failed to list secrets: %w", err)
  222. }
  223. log.V(1).Info("gcp sm findByName found", "secrets", strconv.Itoa(it.PageInfo().Remaining()))
  224. key := sm.trimName(resp.Name)
  225. // If we don't match we skip.
  226. // Also, if we have path, and it is not at the beguining we skip.
  227. // We have to check if path is at the beguining of the key because
  228. // there is no way to create a `name:%s*` (starts with) filter
  229. // At https://cloud.google.com/secret-manager/docs/filtering you can use `*`
  230. // but not like that it seems.
  231. if !matcher.MatchName(key) || (ref.Path != nil && !strings.HasPrefix(key, *ref.Path)) {
  232. continue
  233. }
  234. log.V(1).Info("gcp sm findByName matches", "name", resp.Name)
  235. secretMap[key], err = sm.getData(ctx, key)
  236. if err != nil {
  237. return nil, err
  238. }
  239. }
  240. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  241. }
  242. func (sm *ProviderGCP) getData(ctx context.Context, key string) ([]byte, error) {
  243. dataRef := esv1beta1.ExternalSecretDataRemoteRef{
  244. Key: key,
  245. }
  246. data, err := sm.GetSecret(ctx, dataRef)
  247. if err != nil {
  248. return []byte(""), err
  249. }
  250. return data, nil
  251. }
  252. func (sm *ProviderGCP) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  253. var tagFilter string
  254. for k, v := range ref.Tags {
  255. tagFilter = fmt.Sprintf("%slabels.%s=%s ", tagFilter, k, v)
  256. }
  257. tagFilter = strings.TrimSuffix(tagFilter, " ")
  258. if ref.Path != nil {
  259. tagFilter = fmt.Sprintf("%s name:%s", tagFilter, *ref.Path)
  260. }
  261. req := &secretmanagerpb.ListSecretsRequest{
  262. Parent: fmt.Sprintf("projects/%s", sm.projectID),
  263. }
  264. log.V(1).Info("gcp sm findByTags", "tagFilter", tagFilter)
  265. req.Filter = tagFilter
  266. // Call the API.
  267. it := sm.SecretManagerClient.ListSecrets(ctx, req)
  268. secretMap := make(map[string][]byte)
  269. for {
  270. resp, err := it.Next()
  271. if errors.Is(err, iterator.Done) {
  272. break
  273. }
  274. if err != nil {
  275. return nil, fmt.Errorf("failed to list secrets: %w", err)
  276. }
  277. key := sm.trimName(resp.Name)
  278. if ref.Path != nil && !strings.HasPrefix(key, *ref.Path) {
  279. continue
  280. }
  281. log.V(1).Info("gcp sm findByTags matches tags", "name", resp.Name)
  282. secretMap[key], err = sm.getData(ctx, key)
  283. if err != nil {
  284. return nil, err
  285. }
  286. }
  287. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  288. }
  289. func (sm *ProviderGCP) trimName(name string) string {
  290. projectIDNumuber := sm.extractProjectIDNumber(name)
  291. key := strings.TrimPrefix(name, fmt.Sprintf("projects/%s/secrets/", projectIDNumuber))
  292. return key
  293. }
  294. // extractProjectIDNumber grabs the project id from the full name returned by gcp api
  295. // gcp api seems to always return the number and not the project name
  296. // (and users would always use the name, while requests accept both).
  297. func (sm *ProviderGCP) extractProjectIDNumber(secretFullName string) string {
  298. s := strings.Split(secretFullName, "/")
  299. projectIDNumuber := s[1]
  300. return projectIDNumuber
  301. }
  302. // GetSecret returns a single secret from the provider.
  303. func (sm *ProviderGCP) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  304. if utils.IsNil(sm.SecretManagerClient) || sm.projectID == "" {
  305. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  306. }
  307. version := ref.Version
  308. if version == "" {
  309. version = defaultVersion
  310. }
  311. req := &secretmanagerpb.AccessSecretVersionRequest{
  312. Name: fmt.Sprintf("projects/%s/secrets/%s/versions/%s", sm.projectID, ref.Key, version),
  313. }
  314. result, err := sm.SecretManagerClient.AccessSecretVersion(ctx, req)
  315. if err != nil {
  316. return nil, fmt.Errorf(errClientGetSecretAccess, err)
  317. }
  318. if ref.Property == "" {
  319. if result.Payload.Data != nil {
  320. return result.Payload.Data, nil
  321. }
  322. return nil, fmt.Errorf("invalid secret received. no secret string for key: %s", ref.Key)
  323. }
  324. var payload string
  325. if result.Payload.Data != nil {
  326. payload = string(result.Payload.Data)
  327. }
  328. idx := strings.Index(ref.Property, ".")
  329. refProperty := ref.Property
  330. if idx > 0 {
  331. refProperty = strings.ReplaceAll(refProperty, ".", "\\.")
  332. val := gjson.Get(payload, refProperty)
  333. if val.Exists() {
  334. return []byte(val.String()), nil
  335. }
  336. }
  337. val := gjson.Get(payload, ref.Property)
  338. if !val.Exists() {
  339. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  340. }
  341. return []byte(val.String()), nil
  342. }
  343. // GetSecretMap returns multiple k/v pairs from the provider.
  344. func (sm *ProviderGCP) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  345. if sm.SecretManagerClient == nil || sm.projectID == "" {
  346. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  347. }
  348. data, err := sm.GetSecret(ctx, ref)
  349. if err != nil {
  350. return nil, err
  351. }
  352. kv := make(map[string]json.RawMessage)
  353. err = json.Unmarshal(data, &kv)
  354. if err != nil {
  355. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  356. }
  357. secretData := make(map[string][]byte)
  358. for k, v := range kv {
  359. var strVal string
  360. err = json.Unmarshal(v, &strVal)
  361. if err == nil {
  362. secretData[k] = []byte(strVal)
  363. } else {
  364. secretData[k] = v
  365. }
  366. }
  367. return secretData, nil
  368. }
  369. func (sm *ProviderGCP) Close(ctx context.Context) error {
  370. err := sm.SecretManagerClient.Close()
  371. if sm.gClient != nil {
  372. err = sm.gClient.Close()
  373. }
  374. useMu.Unlock()
  375. if err != nil {
  376. return fmt.Errorf(errClientClose, err)
  377. }
  378. return nil
  379. }
  380. func (sm *ProviderGCP) Validate() (esv1beta1.ValidationResult, error) {
  381. return esv1beta1.ValidationResultReady, nil
  382. }
  383. func (sm *ProviderGCP) ValidateStore(store esv1beta1.GenericStore) error {
  384. if store == nil {
  385. return fmt.Errorf(errInvalidStore)
  386. }
  387. spc := store.GetSpec()
  388. if spc == nil {
  389. return fmt.Errorf(errInvalidStoreSpec)
  390. }
  391. if spc.Provider == nil {
  392. return fmt.Errorf(errInvalidStoreProv)
  393. }
  394. p := spc.Provider.GCPSM
  395. if p == nil {
  396. return fmt.Errorf(errInvalidGCPProv)
  397. }
  398. if p.Auth.SecretRef != nil {
  399. if err := utils.ValidateSecretSelector(store, p.Auth.SecretRef.SecretAccessKey); err != nil {
  400. return fmt.Errorf(errInvalidAuthSecretRef, err)
  401. }
  402. }
  403. if p.Auth.WorkloadIdentity != nil {
  404. if err := utils.ValidateServiceAccountSelector(store, p.Auth.WorkloadIdentity.ServiceAccountRef); err != nil {
  405. return fmt.Errorf(errInvalidWISARef, err)
  406. }
  407. }
  408. return nil
  409. }
  410. func init() {
  411. esv1beta1.Register(&ProviderGCP{}, &esv1beta1.SecretStoreProvider{
  412. GCPSM: &esv1beta1.GCPSMProvider{},
  413. })
  414. }