oracle.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "context"
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "time"
  19. "github.com/oracle/oci-go-sdk/v56/common"
  20. "github.com/oracle/oci-go-sdk/v56/common/auth"
  21. "github.com/oracle/oci-go-sdk/v56/keymanagement"
  22. "github.com/oracle/oci-go-sdk/v56/secrets"
  23. "github.com/tidwall/gjson"
  24. corev1 "k8s.io/api/core/v1"
  25. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  26. "k8s.io/apimachinery/pkg/types"
  27. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  28. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  29. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  30. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  31. "github.com/external-secrets/external-secrets/pkg/utils"
  32. )
  33. const (
  34. errOracleClient = "cannot setup new oracle client: %w"
  35. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  36. errUninitalizedOracleProvider = "provider oracle is not initialized"
  37. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  38. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  39. errMissingPK = "missing PrivateKey"
  40. errMissingUser = "missing User ID"
  41. errMissingTenancy = "missing Tenancy ID"
  42. errMissingRegion = "missing Region"
  43. errMissingFingerprint = "missing Fingerprint"
  44. errMissingVault = "missing Vault"
  45. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  46. errMissingKey = "missing Key in secret: %s"
  47. errUnexpectedContent = "unexpected secret bundle content"
  48. )
  49. // https://github.com/external-secrets/external-secrets/issues/644
  50. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  51. var _ esv1beta1.Provider = &VaultManagementService{}
  52. type VaultManagementService struct {
  53. Client VMInterface
  54. KmsVaultClient KmsVCInterface
  55. vault string
  56. }
  57. type VMInterface interface {
  58. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  59. }
  60. type KmsVCInterface interface {
  61. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  62. }
  63. // Not Implemented PushSecret.
  64. func (vms *VaultManagementService) PushSecret(_ context.Context, _ []byte, _ *apiextensionsv1.JSON, _ esv1beta1.PushRemoteRef) error {
  65. return fmt.Errorf("not implemented")
  66. }
  67. func (vms *VaultManagementService) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
  68. return fmt.Errorf("not implemented")
  69. }
  70. // Empty GetAllSecrets.
  71. func (vms *VaultManagementService) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  72. // TO be implemented
  73. return nil, fmt.Errorf("GetAllSecrets not implemented")
  74. }
  75. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  76. if utils.IsNil(vms.Client) {
  77. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  78. }
  79. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  80. VaultId: &vms.vault,
  81. SecretName: &ref.Key,
  82. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  83. })
  84. if err != nil {
  85. return nil, util.SanitizeErr(err)
  86. }
  87. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  88. if !ok {
  89. return nil, fmt.Errorf(errUnexpectedContent)
  90. }
  91. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  92. if err != nil {
  93. return nil, err
  94. }
  95. if ref.Property == "" {
  96. return payload, nil
  97. }
  98. val := gjson.Get(string(payload), ref.Property)
  99. if !val.Exists() {
  100. return nil, fmt.Errorf(errMissingKey, ref.Key)
  101. }
  102. return []byte(val.String()), nil
  103. }
  104. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  105. data, err := vms.GetSecret(ctx, ref)
  106. if err != nil {
  107. return nil, err
  108. }
  109. kv := make(map[string]string)
  110. err = json.Unmarshal(data, &kv)
  111. if err != nil {
  112. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  113. }
  114. secretData := make(map[string][]byte)
  115. for k, v := range kv {
  116. secretData[k] = []byte(v)
  117. }
  118. return secretData, nil
  119. }
  120. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  121. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  122. return esv1beta1.SecretStoreReadOnly
  123. }
  124. // NewClient constructs a new secrets client based on the provided store.
  125. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  126. storeSpec := store.GetSpec()
  127. oracleSpec := storeSpec.Provider.Oracle
  128. if oracleSpec.Vault == "" {
  129. return nil, fmt.Errorf(errMissingVault)
  130. }
  131. if oracleSpec.Region == "" {
  132. return nil, fmt.Errorf(errMissingRegion)
  133. }
  134. var (
  135. err error
  136. configurationProvider common.ConfigurationProvider
  137. )
  138. if oracleSpec.Auth == nil {
  139. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  140. } else {
  141. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  142. }
  143. if err != nil {
  144. return nil, fmt.Errorf(errOracleClient, err)
  145. }
  146. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  147. if err != nil {
  148. return nil, fmt.Errorf(errOracleClient, err)
  149. }
  150. secretManagementService.SetRegion(oracleSpec.Region)
  151. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  152. if err != nil {
  153. return nil, fmt.Errorf(errOracleClient, err)
  154. }
  155. kmsVaultClient.SetRegion(oracleSpec.Region)
  156. if storeSpec.RetrySettings != nil {
  157. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  158. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  159. opts = append(opts, common.WithMaximumNumberAttempts(uint(*mr)))
  160. }
  161. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  162. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  163. if err != nil {
  164. return nil, fmt.Errorf(errOracleClient, err)
  165. }
  166. opts = append(opts, common.WithFixedBackoff(i))
  167. }
  168. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  169. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  170. RetryPolicy: &customRetryPolicy,
  171. })
  172. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  173. RetryPolicy: &customRetryPolicy,
  174. })
  175. }
  176. return &VaultManagementService{
  177. Client: secretManagementService,
  178. KmsVaultClient: kmsVaultClient,
  179. vault: oracleSpec.Vault,
  180. }, nil
  181. }
  182. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  183. if secretRef.Name == "" {
  184. return "", fmt.Errorf(errORACLECredSecretName)
  185. }
  186. objectKey := types.NamespacedName{
  187. Name: secretRef.Name,
  188. Namespace: namespace,
  189. }
  190. // only ClusterStore is allowed to set namespace (and then it's required)
  191. if storeKind == esv1beta1.ClusterSecretStoreKind {
  192. if secretRef.Namespace == nil {
  193. return "", fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  194. }
  195. objectKey.Namespace = *secretRef.Namespace
  196. }
  197. secret := corev1.Secret{}
  198. err := kube.Get(ctx, objectKey, &secret)
  199. if err != nil {
  200. return "", fmt.Errorf(errFetchSAKSecret, err)
  201. }
  202. return string(secret.Data[secretRef.Key]), nil
  203. }
  204. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  205. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  206. if err != nil {
  207. return nil, err
  208. }
  209. if privateKey == "" {
  210. return nil, fmt.Errorf(errMissingPK)
  211. }
  212. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  213. if err != nil {
  214. return nil, err
  215. }
  216. if fingerprint == "" {
  217. return nil, fmt.Errorf(errMissingFingerprint)
  218. }
  219. if store.Auth.User == "" {
  220. return nil, fmt.Errorf(errMissingUser)
  221. }
  222. if store.Auth.Tenancy == "" {
  223. return nil, fmt.Errorf(errMissingTenancy)
  224. }
  225. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  226. }
  227. func (vms *VaultManagementService) Close(_ context.Context) error {
  228. return nil
  229. }
  230. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  231. _, err := vms.KmsVaultClient.GetVault(
  232. context.Background(), keymanagement.GetVaultRequest{
  233. VaultId: &vms.vault,
  234. },
  235. )
  236. if err != nil {
  237. failure, ok := common.IsServiceError(err)
  238. if ok {
  239. code := failure.GetCode()
  240. switch code {
  241. case "NotAuthenticated":
  242. return esv1beta1.ValidationResultError, err
  243. case "NotAuthorizedOrNotFound":
  244. // User authentication was successful, but user might not have a permission like:
  245. //
  246. // Allow group external_secrets to read vaults in tenancy
  247. //
  248. // Which is fine, because to read secrets we only need:
  249. //
  250. // Allow group external_secrets to read secret-family in tenancy
  251. //
  252. // But we can't test for this permission without knowing the name of a secret
  253. return esv1beta1.ValidationResultUnknown, err
  254. default:
  255. return esv1beta1.ValidationResultError, err
  256. }
  257. } else {
  258. return esv1beta1.ValidationResultError, err
  259. }
  260. }
  261. return esv1beta1.ValidationResultReady, nil
  262. }
  263. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  264. storeSpec := store.GetSpec()
  265. oracleSpec := storeSpec.Provider.Oracle
  266. vault := oracleSpec.Vault
  267. if vault == "" {
  268. return fmt.Errorf("vault cannot be empty")
  269. }
  270. region := oracleSpec.Region
  271. if region == "" {
  272. return fmt.Errorf("region cannot be empty")
  273. }
  274. auth := oracleSpec.Auth
  275. if auth == nil {
  276. return nil
  277. }
  278. user := oracleSpec.Auth.User
  279. if user == "" {
  280. return fmt.Errorf("user cannot be empty")
  281. }
  282. tenant := oracleSpec.Auth.Tenancy
  283. if tenant == "" {
  284. return fmt.Errorf("tenant cannot be empty")
  285. }
  286. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  287. if privateKey.Name == "" {
  288. return fmt.Errorf("privateKey.name cannot be empty")
  289. }
  290. if privateKey.Key == "" {
  291. return fmt.Errorf("privateKey.key cannot be empty")
  292. }
  293. err := utils.ValidateSecretSelector(store, privateKey)
  294. if err != nil {
  295. return err
  296. }
  297. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  298. if fingerprint.Name == "" {
  299. return fmt.Errorf("fingerprint.name cannot be empty")
  300. }
  301. if fingerprint.Key == "" {
  302. return fmt.Errorf("fingerprint.key cannot be empty")
  303. }
  304. err = utils.ValidateSecretSelector(store, fingerprint)
  305. if err != nil {
  306. return err
  307. }
  308. return nil
  309. }
  310. func init() {
  311. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  312. Oracle: &esv1beta1.OracleProvider{},
  313. })
  314. }