onepassword.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package onepassword
  13. import (
  14. "context"
  15. "fmt"
  16. "net/url"
  17. "sort"
  18. "github.com/1Password/connect-sdk-go/connect"
  19. "github.com/1Password/connect-sdk-go/onepassword"
  20. corev1 "k8s.io/api/core/v1"
  21. "k8s.io/apimachinery/pkg/types"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. "github.com/external-secrets/external-secrets/pkg/find"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. )
  27. const (
  28. userAgent = "external-secrets"
  29. errOnePasswordStore = "received invalid 1Password SecretStore resource: %w"
  30. errOnePasswordStoreNilSpec = "nil spec"
  31. errOnePasswordStoreNilSpecProvider = "nil spec.provider"
  32. errOnePasswordStoreNilSpecProviderOnePassword = "nil spec.provider.onepassword"
  33. errOnePasswordStoreMissingRefName = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.name"
  34. errOnePasswordStoreMissingRefKey = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.key"
  35. errOnePasswordStoreAtLeastOneVault = "must be at least one vault: spec.provider.onepassword.vaults"
  36. errOnePasswordStoreInvalidConnectHost = "unable to parse URL: spec.provider.onepassword.connectHost: %w"
  37. errOnePasswordStoreNonUniqueVaultNumbers = "vault order numbers must be unique"
  38. errFetchK8sSecret = "could not fetch ConnectToken Secret: %w"
  39. errMissingToken = "missing Secret Token"
  40. errGetVault = "error finding 1Password Vault: %w"
  41. errExpectedOneItem = "expected one 1Password Item matching %w"
  42. errGetItem = "error finding 1Password Item: %w"
  43. errKeyNotFound = "key not found in 1Password Vaults: %w"
  44. errDocumentNotFound = "error finding 1Password Document: %w"
  45. errExpectedOneField = "expected one 1Password ItemField matching %w"
  46. errTagsNotImplemented = "'find.tags' is not implemented in the 1Password provider"
  47. errVersionNotImplemented = "'remoteRef.version' is not implemented in the 1Password provider"
  48. documentCategory = "DOCUMENT"
  49. fieldsWithLabelFormat = "'%s' in '%s', got %d"
  50. incorrectCountFormat = "'%s', got %d"
  51. )
  52. // ProviderOnePassword is a provider for 1Password.
  53. type ProviderOnePassword struct {
  54. vaults map[string]int
  55. client connect.Client
  56. }
  57. // https://github.com/external-secrets/external-secrets/issues/644
  58. var _ esv1beta1.SecretsClient = &ProviderOnePassword{}
  59. var _ esv1beta1.Provider = &ProviderOnePassword{}
  60. // NewClient constructs a 1Password Provider.
  61. func (provider *ProviderOnePassword) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  62. config := store.GetSpec().Provider.OnePassword
  63. credentialsSecret := &corev1.Secret{}
  64. objectKey := types.NamespacedName{
  65. Name: config.Auth.SecretRef.ConnectToken.Name,
  66. Namespace: namespace,
  67. }
  68. // only ClusterSecretStore is allowed to set namespace (and then it's required)
  69. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  70. objectKey.Namespace = *config.Auth.SecretRef.ConnectToken.Namespace
  71. }
  72. err := kube.Get(ctx, objectKey, credentialsSecret)
  73. if err != nil {
  74. return nil, fmt.Errorf(errFetchK8sSecret, err)
  75. }
  76. token := credentialsSecret.Data[config.Auth.SecretRef.ConnectToken.Key]
  77. if (token == nil) || (len(token) == 0) {
  78. return nil, fmt.Errorf(errMissingToken)
  79. }
  80. provider.client = connect.NewClientWithUserAgent(config.ConnectHost, string(token), userAgent)
  81. provider.vaults = config.Vaults
  82. return provider, nil
  83. }
  84. // ValidateStore checks if the provided store is valid.
  85. func (provider *ProviderOnePassword) ValidateStore(store esv1beta1.GenericStore) error {
  86. return validateStore(store)
  87. }
  88. func validateStore(store esv1beta1.GenericStore) error {
  89. // check nils
  90. storeSpec := store.GetSpec()
  91. if storeSpec == nil {
  92. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpec))
  93. }
  94. if storeSpec.Provider == nil {
  95. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProvider))
  96. }
  97. if storeSpec.Provider.OnePassword == nil {
  98. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNilSpecProviderOnePassword))
  99. }
  100. // check mandatory fields
  101. config := storeSpec.Provider.OnePassword
  102. if config.Auth.SecretRef.ConnectToken.Name == "" {
  103. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefName))
  104. }
  105. if config.Auth.SecretRef.ConnectToken.Key == "" {
  106. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreMissingRefKey))
  107. }
  108. // check namespace compared to kind
  109. if err := utils.ValidateSecretSelector(store, config.Auth.SecretRef.ConnectToken); err != nil {
  110. return fmt.Errorf(errOnePasswordStore, err)
  111. }
  112. // check at least one vault
  113. if len(config.Vaults) == 0 {
  114. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreAtLeastOneVault))
  115. }
  116. // ensure vault numbers are unique
  117. if !hasUniqueVaultNumbers(config.Vaults) {
  118. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreNonUniqueVaultNumbers))
  119. }
  120. // check valid URL
  121. if _, err := url.Parse(config.ConnectHost); err != nil {
  122. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreInvalidConnectHost, err))
  123. }
  124. return nil
  125. }
  126. // GetSecret returns a single secret from the provider.
  127. func (provider *ProviderOnePassword) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  128. if ref.Version != "" {
  129. return nil, fmt.Errorf(errVersionNotImplemented)
  130. }
  131. item, err := provider.findItem(ref.Key)
  132. if err != nil {
  133. return nil, err
  134. }
  135. // handle files
  136. if item.Category == documentCategory {
  137. // default to the first file when ref.Property is empty
  138. return provider.getFile(item, ref.Property)
  139. }
  140. // handle fields
  141. return provider.getField(item, ref.Property)
  142. }
  143. // Validate checks if the client is configured correctly
  144. // to be able to retrieve secrets from the provider.
  145. func (provider *ProviderOnePassword) Validate() (esv1beta1.ValidationResult, error) {
  146. for vaultName := range provider.vaults {
  147. _, err := provider.client.GetVaultByTitle(vaultName)
  148. if err != nil {
  149. return esv1beta1.ValidationResultError, err
  150. }
  151. }
  152. return esv1beta1.ValidationResultReady, nil
  153. }
  154. // GetSecretMap returns multiple k/v pairs from the provider, for dataFrom.extract.
  155. func (provider *ProviderOnePassword) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  156. if ref.Version != "" {
  157. return nil, fmt.Errorf(errVersionNotImplemented)
  158. }
  159. item, err := provider.findItem(ref.Key)
  160. if err != nil {
  161. return nil, err
  162. }
  163. // handle files
  164. if item.Category == documentCategory {
  165. return provider.getFiles(item, ref.Property)
  166. }
  167. // handle fields
  168. return provider.getFields(item, ref.Property)
  169. }
  170. // GetAllSecrets syncs multiple 1Password Items into a single Kubernetes Secret, for dataFrom.find.
  171. func (provider *ProviderOnePassword) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  172. if ref.Tags != nil {
  173. return nil, fmt.Errorf(errTagsNotImplemented)
  174. }
  175. secretData := make(map[string][]byte)
  176. sortedVaults := sortVaults(provider.vaults)
  177. for _, vaultName := range sortedVaults {
  178. vault, err := provider.client.GetVaultByTitle(vaultName)
  179. if err != nil {
  180. return nil, fmt.Errorf(errGetVault, err)
  181. }
  182. err = provider.getAllForVault(vault.ID, ref, secretData)
  183. if err != nil {
  184. return nil, err
  185. }
  186. }
  187. return secretData, nil
  188. }
  189. // Close closes the client connection.
  190. func (provider *ProviderOnePassword) Close(ctx context.Context) error {
  191. return nil
  192. }
  193. func (provider *ProviderOnePassword) findItem(name string) (*onepassword.Item, error) {
  194. sortedVaults := sortVaults(provider.vaults)
  195. for _, vaultName := range sortedVaults {
  196. vault, err := provider.client.GetVaultByTitle(vaultName)
  197. if err != nil {
  198. return nil, fmt.Errorf(errGetVault, err)
  199. }
  200. // use GetItemsByTitle instead of GetItemByTitle in order to handle length cases
  201. items, err := provider.client.GetItemsByTitle(name, vault.ID)
  202. if err != nil {
  203. return nil, fmt.Errorf(errGetItem, err)
  204. }
  205. switch {
  206. case len(items) == 1:
  207. return provider.client.GetItemByUUID(items[0].ID, items[0].Vault.ID)
  208. case len(items) > 1:
  209. return nil, fmt.Errorf(errExpectedOneItem, fmt.Errorf(incorrectCountFormat, name, len(items)))
  210. }
  211. }
  212. return nil, fmt.Errorf(errKeyNotFound, fmt.Errorf("%s in: %v", name, provider.vaults))
  213. }
  214. func (provider *ProviderOnePassword) getField(item *onepassword.Item, property string) ([]byte, error) {
  215. // default to a field labeled "password"
  216. fieldLabel := "password"
  217. if property != "" {
  218. fieldLabel = property
  219. }
  220. if length := countFieldsWithLabel(fieldLabel, item.Fields); length != 1 {
  221. return nil, fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, fieldLabel, item.Title, length))
  222. }
  223. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  224. value := ""
  225. for _, field := range item.Fields {
  226. if field.Label == fieldLabel {
  227. value = field.Value
  228. break
  229. }
  230. }
  231. return []byte(value), nil
  232. }
  233. func (provider *ProviderOnePassword) getFields(item *onepassword.Item, property string) (map[string][]byte, error) {
  234. secretData := make(map[string][]byte)
  235. for _, field := range item.Fields {
  236. if property != "" && field.Label != property {
  237. continue
  238. }
  239. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  240. return nil, fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, field.Label, item.Title, length))
  241. }
  242. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  243. secretData[field.Label] = []byte(field.Value)
  244. }
  245. return secretData, nil
  246. }
  247. func (provider *ProviderOnePassword) getAllFields(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  248. i, err := provider.client.GetItemByUUID(item.ID, item.Vault.ID)
  249. if err != nil {
  250. return fmt.Errorf(errGetItem, err)
  251. }
  252. item = *i
  253. for _, field := range item.Fields {
  254. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  255. return fmt.Errorf(errExpectedOneField, fmt.Errorf(fieldsWithLabelFormat, field.Label, item.Title, length))
  256. }
  257. if ref.Name != nil {
  258. matcher, err := find.New(*ref.Name)
  259. if err != nil {
  260. return err
  261. }
  262. if !matcher.MatchName(field.Label) {
  263. continue
  264. }
  265. }
  266. if _, ok := secretData[field.Label]; !ok {
  267. secretData[field.Label] = []byte(field.Value)
  268. }
  269. }
  270. return nil
  271. }
  272. func (provider *ProviderOnePassword) getFile(item *onepassword.Item, property string) ([]byte, error) {
  273. for _, file := range item.Files {
  274. // default to the first file when ref.Property is empty
  275. if file.Name == property || property == "" {
  276. contents, err := provider.client.GetFileContent(file)
  277. if err != nil {
  278. return nil, err
  279. }
  280. return contents, nil
  281. }
  282. }
  283. return nil, fmt.Errorf(errDocumentNotFound, fmt.Errorf("'%s', '%s'", item.Title, property))
  284. }
  285. func (provider *ProviderOnePassword) getFiles(item *onepassword.Item, property string) (map[string][]byte, error) {
  286. secretData := make(map[string][]byte)
  287. for _, file := range item.Files {
  288. if property != "" && file.Name != property {
  289. continue
  290. }
  291. contents, err := provider.client.GetFileContent(file)
  292. if err != nil {
  293. return nil, err
  294. }
  295. secretData[file.Name] = contents
  296. }
  297. return secretData, nil
  298. }
  299. func (provider *ProviderOnePassword) getAllFiles(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  300. for _, file := range item.Files {
  301. if ref.Name != nil {
  302. matcher, err := find.New(*ref.Name)
  303. if err != nil {
  304. return err
  305. }
  306. if !matcher.MatchName(file.Name) {
  307. continue
  308. }
  309. }
  310. if _, ok := secretData[file.Name]; !ok {
  311. contents, err := provider.client.GetFileContent(file)
  312. if err != nil {
  313. return err
  314. }
  315. secretData[file.Name] = contents
  316. }
  317. }
  318. return nil
  319. }
  320. func (provider *ProviderOnePassword) getAllForVault(vaultID string, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  321. items, err := provider.client.GetItems(vaultID)
  322. if err != nil {
  323. return fmt.Errorf(errGetItem, err)
  324. }
  325. for _, item := range items {
  326. if ref.Path != nil && *ref.Path != item.Title {
  327. continue
  328. }
  329. // handle files
  330. if item.Category == documentCategory {
  331. err = provider.getAllFiles(item, ref, secretData)
  332. if err != nil {
  333. return err
  334. }
  335. continue
  336. }
  337. // handle fields
  338. err = provider.getAllFields(item, ref, secretData)
  339. if err != nil {
  340. return err
  341. }
  342. }
  343. return nil
  344. }
  345. func countFieldsWithLabel(fieldLabel string, fields []*onepassword.ItemField) int {
  346. count := 0
  347. for _, field := range fields {
  348. if field.Label == fieldLabel {
  349. count++
  350. }
  351. }
  352. return count
  353. }
  354. type orderedVault struct {
  355. Name string
  356. Order int
  357. }
  358. type orderedVaultList []orderedVault
  359. func (list orderedVaultList) Len() int { return len(list) }
  360. func (list orderedVaultList) Swap(i, j int) { list[i], list[j] = list[j], list[i] }
  361. func (list orderedVaultList) Less(i, j int) bool { return list[i].Order < list[j].Order }
  362. func sortVaults(vaults map[string]int) []string {
  363. list := make(orderedVaultList, len(vaults))
  364. index := 0
  365. for key, value := range vaults {
  366. list[index] = orderedVault{key, value}
  367. index++
  368. }
  369. sort.Sort(list)
  370. sortedVaults := []string{}
  371. for _, item := range list {
  372. sortedVaults = append(sortedVaults, item.Name)
  373. }
  374. return sortedVaults
  375. }
  376. func hasUniqueVaultNumbers(vaults map[string]int) bool {
  377. unique := make([]int, 0, len(vaults))
  378. tracker := make(map[int]bool)
  379. for _, number := range vaults {
  380. if _, ok := tracker[number]; !ok {
  381. tracker[number] = true
  382. unique = append(unique, number)
  383. }
  384. }
  385. return len(vaults) == len(unique)
  386. }
  387. func init() {
  388. esv1beta1.Register(&ProviderOnePassword{}, &esv1beta1.SecretStoreProvider{
  389. OnePassword: &esv1beta1.OnePasswordProvider{},
  390. })
  391. }