client.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package keepersecurity
  14. import (
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "maps"
  20. "regexp"
  21. "strings"
  22. ksm "github.com/keeper-security/secrets-manager-go/core"
  23. corev1 "k8s.io/api/core/v1"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. )
  26. const (
  27. errKeeperSecuritySecretsNotFound = "unable to find secrets. %w"
  28. errKeeperSecuritySecretNotFound = "unable to find secret %s. Error: %w"
  29. errKeeperSecuritySecretNotUnique = "more than 1 secret %s found"
  30. errKeeperSecurityNoSecretsFound = "no secrets found"
  31. errKeeperSecurityInvalidSecretInvalidFormat = "invalid secret. Invalid format: %w"
  32. errKeeperSecurityInvalidSecretDuplicatedKey = "invalid Secret. Following keys are duplicated %s"
  33. errKeeperSecurityInvalidProperty = "invalid Property. Secret %s does not have any key matching %s"
  34. errKeeperSecurityInvalidField = "invalid Field. Key %s does not exists"
  35. errKeeperSecurityNoFields = "invalid Secret. Secret %s does not contain any valid field/file"
  36. keeperSecurityFileRef = "fileRef"
  37. keeperSecurityMfa = "oneTimeCode"
  38. errTagsNotImplemented = "'find.tags' is not implemented in the KeeperSecurity provider"
  39. errPathNotImplemented = "'find.path' is not implemented in the KeeperSecurity provider"
  40. errInvalidJSONSecret = "invalid Secret. Secret %s can not be converted to JSON. %w"
  41. errInvalidRegex = "find.name.regex. Invalid Regular expresion %s. %w"
  42. errInvalidRemoteRefKey = "match.remoteRef.remoteKey. Invalid format. Format should match secretName/key got %s"
  43. errInvalidSecretType = "ESO can only push/delete records of type %s. Secret %s is type %s"
  44. errFieldNotFound = "secret %s does not contain any custom field with label %s"
  45. externalSecretType = "externalSecrets"
  46. secretType = "secret"
  47. // LoginType represents the login field type.
  48. LoginType = "login"
  49. // LoginTypeExpr is the regex expression for matching login/username fields.
  50. LoginTypeExpr = "login|username"
  51. // PasswordType represents the password field type.
  52. PasswordType = "password"
  53. // URLTypeExpr is the regex expression for matching URL/baseurl fields.
  54. URLTypeExpr = "url|baseurl"
  55. // URLType represents the URL field type.
  56. URLType = "url"
  57. )
  58. // Client represents a KeeperSecurity client that can interact with the KeeperSecurity API.
  59. type Client struct {
  60. ksmClient SecurityClient
  61. folderID string
  62. }
  63. // SecurityClient defines the interface for interacting with KeeperSecurity's API.
  64. type SecurityClient interface {
  65. GetSecrets(filter []string) ([]*ksm.Record, error)
  66. GetSecretByTitle(recordTitle string) (*ksm.Record, error)
  67. GetSecretsByTitle(recordTitle string) (records []*ksm.Record, err error)
  68. CreateSecretWithRecordData(recUID, folderUID string, recordData *ksm.RecordCreate) (string, error)
  69. DeleteSecrets(recrecordUids []string) (map[string]string, error)
  70. Save(record *ksm.Record) error
  71. }
  72. // Field represents a KeeperSecurity field with its type and value.
  73. type Field struct {
  74. Type string `json:"type"`
  75. Value []any `json:"value"`
  76. }
  77. // CustomField represents a custom field in KeeperSecurity with its type, label and value.
  78. type CustomField struct {
  79. Type string `json:"type"`
  80. Label string `json:"label"`
  81. Value []any `json:"value"`
  82. }
  83. // File represents a file stored in KeeperSecurity with its title and content.
  84. type File struct {
  85. Title string `json:"type"`
  86. Content string `json:"content"`
  87. }
  88. // Secret represents a KeeperSecurity secret with its metadata and content.
  89. type Secret struct {
  90. Title string `json:"title"`
  91. Type string `json:"type"`
  92. Fields []Field `json:"fields"`
  93. Custom []CustomField `json:"custom"`
  94. Files []File `json:"files"`
  95. }
  96. // Validate performs validation of the Keeper Security client configuration.
  97. func (c *Client) Validate() (esv1.ValidationResult, error) {
  98. return esv1.ValidationResultReady, nil
  99. }
  100. // GetSecret retrieves a secret from Keeper Security by its ID.
  101. func (c *Client) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  102. record, err := c.findSecretByID(ref.Key)
  103. if err != nil {
  104. return nil, err
  105. }
  106. secret, err := c.getValidKeeperSecret(record)
  107. if err != nil {
  108. return nil, err
  109. }
  110. // GetSecret retrieves a secret from Keeper Security by its ID.
  111. // If ref.Property is specified, it returns only that property's value.
  112. return secret.getItem(ref)
  113. }
  114. // GetSecretMap retrieves a secret from Keeper Security and returns it as a map.
  115. func (c *Client) GetSecretMap(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  116. record, err := c.findSecretByID(ref.Key)
  117. if err != nil {
  118. return nil, err
  119. }
  120. secret, err := c.getValidKeeperSecret(record)
  121. if err != nil {
  122. return nil, err
  123. }
  124. // GetSecretMap retrieves a secret from Keeper Security and returns it as a map.
  125. // If ref.Property is specified, it returns only that property as a map entry.
  126. return secret.getItems(ref)
  127. }
  128. // GetAllSecrets retrieves all secrets from Keeper Security that match the given criteria.
  129. func (c *Client) GetAllSecrets(_ context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  130. if ref.Tags != nil {
  131. return nil, errors.New(errTagsNotImplemented)
  132. }
  133. if ref.Path != nil {
  134. return nil, errors.New(errPathNotImplemented)
  135. }
  136. secretData := make(map[string][]byte)
  137. records, err := c.findSecrets()
  138. // GetAllSecrets retrieves all secrets from Keeper Security that match the given criteria.
  139. // Currently supports filtering by name pattern only.
  140. if err != nil {
  141. return nil, err
  142. }
  143. for _, record := range records {
  144. secret, err := c.getValidKeeperSecret(record)
  145. if err != nil {
  146. return nil, err
  147. }
  148. match, err := regexp.MatchString(ref.Name.RegExp, secret.Title)
  149. if err != nil {
  150. return nil, fmt.Errorf(errInvalidRegex, ref.Name.RegExp, err)
  151. }
  152. if !match {
  153. continue
  154. }
  155. secretData[secret.Title], err = secret.getItem(esv1.ExternalSecretDataRemoteRef{})
  156. if err != nil {
  157. return nil, err
  158. }
  159. }
  160. return secretData, nil
  161. }
  162. // Close implements cleanup operations for the Keeper Security client.
  163. func (c *Client) Close(_ context.Context) error {
  164. return nil
  165. }
  166. // PushSecret creates or updates a secret in Keeper Security.
  167. func (c *Client) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  168. if data.GetSecretKey() == "" {
  169. return errors.New("pushing the whole secret is not yet implemented")
  170. }
  171. // Close implements cleanup operations for the Keeper Security client
  172. value := secret.Data[data.GetSecretKey()]
  173. parts, err := c.buildSecretNameAndKey(data)
  174. if err != nil {
  175. return err
  176. // PushSecret creates or updates a secret in Keeper Security.
  177. // Currently only supports pushing individual secret values, not entire secrets.
  178. }
  179. record, err := c.findSecretByName(parts[0])
  180. if err != nil {
  181. return err
  182. }
  183. if record != nil {
  184. if record.Type() != externalSecretType {
  185. return fmt.Errorf(errInvalidSecretType, externalSecretType, record.Title(), record.Type())
  186. }
  187. return c.updateSecret(record, parts[1], value)
  188. }
  189. _, err = c.createSecret(parts[0], parts[1], value)
  190. return err
  191. }
  192. // DeleteSecret removes a secret from Keeper Security.
  193. func (c *Client) DeleteSecret(_ context.Context, remoteRef esv1.PushSecretRemoteRef) error {
  194. parts, err := c.buildSecretNameAndKey(remoteRef)
  195. if err != nil {
  196. return err
  197. }
  198. secret, err := c.findSecretByName(parts[0])
  199. if err != nil {
  200. return err
  201. } else if secret == nil {
  202. // DeleteSecret removes a secret from Keeper Security.
  203. // Returns nil if the secret doesn't exist (already deleted).
  204. return nil // not found == already deleted (success)
  205. }
  206. if secret.Type() != externalSecretType {
  207. return fmt.Errorf(errInvalidSecretType, externalSecretType, secret.Title(), secret.Type())
  208. }
  209. _, err = c.ksmClient.DeleteSecrets([]string{secret.Uid})
  210. return err
  211. }
  212. // SecretExists checks if a secret exists in Keeper Security.
  213. func (c *Client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  214. return false, errors.New("not implemented")
  215. }
  216. func (c *Client) buildSecretNameAndKey(remoteRef esv1.PushSecretRemoteRef) ([]string, error) {
  217. parts := strings.Split(remoteRef.GetRemoteKey(), "/")
  218. if len(parts) != 2 {
  219. return nil, fmt.Errorf(errInvalidRemoteRefKey, remoteRef.GetRemoteKey())
  220. }
  221. // SecretExists checks if a secret exists in Keeper Security.
  222. // This method is not implemented yet.
  223. return parts, nil
  224. }
  225. func (c *Client) createSecret(name, key string, value []byte) (string, error) {
  226. normalizedKey := strings.ToLower(key)
  227. externalSecretRecord := ksm.NewRecordCreate(externalSecretType, name)
  228. login := regexp.MustCompile(LoginTypeExpr)
  229. pass := regexp.MustCompile(PasswordType)
  230. url := regexp.MustCompile(URLTypeExpr)
  231. switch {
  232. case login.MatchString(normalizedKey):
  233. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  234. ksm.NewLogin(string(value)),
  235. )
  236. case pass.MatchString(normalizedKey):
  237. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  238. ksm.NewPassword(string(value)),
  239. )
  240. case url.MatchString(normalizedKey):
  241. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  242. ksm.NewUrl(string(value)),
  243. )
  244. default:
  245. field := ksm.KeeperRecordField{Type: secretType, Label: key}
  246. externalSecretRecord.Custom = append(externalSecretRecord.Custom,
  247. ksm.Secret{KeeperRecordField: field, Value: []string{string(value)}},
  248. )
  249. }
  250. return c.ksmClient.CreateSecretWithRecordData("", c.folderID, externalSecretRecord)
  251. }
  252. func (c *Client) updateSecret(secret *ksm.Record, key string, value []byte) error {
  253. normalizedKey := strings.ToLower(key)
  254. login := regexp.MustCompile(LoginTypeExpr)
  255. pass := regexp.MustCompile(PasswordType)
  256. url := regexp.MustCompile(URLTypeExpr)
  257. custom := false
  258. switch {
  259. case login.MatchString(normalizedKey):
  260. secret.SetFieldValueSingle(LoginType, string(value))
  261. case pass.MatchString(normalizedKey):
  262. secret.SetPassword(string(value))
  263. case url.MatchString(normalizedKey):
  264. secret.SetFieldValueSingle(URLType, string(value))
  265. default:
  266. custom = true
  267. }
  268. if custom {
  269. field := secret.GetCustomFieldValueByLabel(key)
  270. if field != "" {
  271. secret.SetCustomFieldValueSingle(key, string(value))
  272. } else {
  273. return fmt.Errorf(errFieldNotFound, secret.Title(), key)
  274. }
  275. }
  276. return c.ksmClient.Save(secret)
  277. }
  278. func (c *Client) getValidKeeperSecret(secret *ksm.Record) (*Secret, error) {
  279. keeperSecret := Secret{}
  280. err := json.Unmarshal([]byte(secret.RawJson), &keeperSecret)
  281. if err != nil {
  282. return nil, fmt.Errorf(errKeeperSecurityInvalidSecretInvalidFormat, err)
  283. }
  284. keeperSecret.addFiles(secret.Files)
  285. err = keeperSecret.validate()
  286. if err != nil {
  287. return nil, err
  288. }
  289. return &keeperSecret, nil
  290. }
  291. func (c *Client) findSecrets() ([]*ksm.Record, error) {
  292. records, err := c.ksmClient.GetSecrets([]string{})
  293. if err != nil {
  294. return nil, fmt.Errorf(errKeeperSecuritySecretsNotFound, err)
  295. }
  296. return records, nil
  297. }
  298. func (c *Client) findSecretByID(id string) (*ksm.Record, error) {
  299. records, err := c.ksmClient.GetSecrets([]string{id})
  300. if err != nil {
  301. return nil, fmt.Errorf(errKeeperSecuritySecretNotFound, id, err)
  302. }
  303. if len(records) == 0 {
  304. return nil, errors.New(errKeeperSecurityNoSecretsFound)
  305. }
  306. return records[0], nil
  307. }
  308. func (c *Client) findSecretByName(name string) (*ksm.Record, error) {
  309. records, err := c.ksmClient.GetSecretsByTitle(name)
  310. if err != nil {
  311. return nil, err
  312. }
  313. // filter in-place, preserve only records of type externalSecretType
  314. n := 0
  315. for _, record := range records {
  316. if record.Type() == externalSecretType {
  317. records[n] = record
  318. n++
  319. }
  320. }
  321. records = records[:n]
  322. // record not found is not an error - handled differently:
  323. // PushSecret will create new record instead
  324. // DeleteSecret will consider record already deleted (no error)
  325. if len(records) == 0 {
  326. return nil, nil
  327. } else if len(records) == 1 {
  328. return records[0], nil
  329. }
  330. // len(records) > 1
  331. return nil, fmt.Errorf(errKeeperSecuritySecretNotUnique, name)
  332. }
  333. func (s *Secret) validate() error {
  334. fields := make(map[string]int)
  335. for _, field := range s.Fields {
  336. fields[field.Type]++
  337. }
  338. for _, customField := range s.Custom {
  339. fields[customField.Label]++
  340. }
  341. for _, file := range s.Files {
  342. fields[file.Title]++
  343. }
  344. var duplicates []string
  345. for key, ocurrences := range fields {
  346. if ocurrences > 1 {
  347. duplicates = append(duplicates, key)
  348. }
  349. }
  350. if len(duplicates) != 0 {
  351. return fmt.Errorf(errKeeperSecurityInvalidSecretDuplicatedKey, strings.Join(duplicates, ", "))
  352. }
  353. return nil
  354. }
  355. func (s *Secret) addFiles(keeperFiles []*ksm.KeeperFile) {
  356. for _, f := range keeperFiles {
  357. s.Files = append(
  358. s.Files,
  359. File{
  360. Title: f.Title,
  361. Content: string(f.GetFileData()),
  362. },
  363. )
  364. }
  365. }
  366. func (s *Secret) getItem(ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  367. if ref.Property != "" {
  368. return s.getProperty(ref.Property)
  369. }
  370. secret, err := s.toString()
  371. return []byte(secret), err
  372. }
  373. func (s *Secret) getItems(ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  374. secretData := make(map[string][]byte)
  375. if ref.Property != "" {
  376. value, err := s.getProperty(ref.Property)
  377. if err != nil {
  378. return nil, err
  379. }
  380. secretData[ref.Property] = value
  381. return secretData, nil
  382. }
  383. fields := s.getFields()
  384. maps.Copy(secretData, fields)
  385. customFields := s.getCustomFields()
  386. maps.Copy(secretData, customFields)
  387. files := s.getFiles()
  388. maps.Copy(secretData, files)
  389. if len(secretData) == 0 {
  390. return nil, fmt.Errorf(errKeeperSecurityNoFields, s.Title)
  391. }
  392. return secretData, nil
  393. }
  394. func getFieldValue(value []any) []byte {
  395. if len(value) < 1 {
  396. return []byte{}
  397. }
  398. if len(value) == 1 {
  399. res, _ := json.Marshal(value[0])
  400. if str, ok := value[0].(string); ok {
  401. res = []byte(str)
  402. }
  403. return res
  404. }
  405. res, _ := json.Marshal(value)
  406. return res
  407. }
  408. func (s *Secret) getField(key string) ([]byte, error) {
  409. for _, field := range s.Fields {
  410. if field.Type == key && field.Type != keeperSecurityFileRef && field.Type != keeperSecurityMfa && len(field.Value) > 0 {
  411. return getFieldValue(field.Value), nil
  412. }
  413. }
  414. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  415. }
  416. func (s *Secret) getFields() map[string][]byte {
  417. secretData := make(map[string][]byte)
  418. for _, field := range s.Fields {
  419. if len(field.Value) > 0 {
  420. secretData[field.Type] = getFieldValue(field.Value)
  421. }
  422. }
  423. return secretData
  424. }
  425. func (s *Secret) getCustomField(key string) ([]byte, error) {
  426. for _, field := range s.Custom {
  427. if field.Label == key && len(field.Value) > 0 {
  428. return getFieldValue(field.Value), nil
  429. }
  430. }
  431. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  432. }
  433. func (s *Secret) getCustomFields() map[string][]byte {
  434. secretData := make(map[string][]byte)
  435. for _, field := range s.Custom {
  436. if len(field.Value) > 0 {
  437. secretData[field.Label] = getFieldValue(field.Value)
  438. }
  439. }
  440. return secretData
  441. }
  442. func (s *Secret) getFile(key string) ([]byte, error) {
  443. for _, file := range s.Files {
  444. if file.Title == key {
  445. return []byte(file.Content), nil
  446. }
  447. }
  448. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  449. }
  450. func (s *Secret) getProperty(key string) ([]byte, error) {
  451. field, _ := s.getField(key)
  452. if field != nil {
  453. return field, nil
  454. }
  455. customField, _ := s.getCustomField(key)
  456. if customField != nil {
  457. return customField, nil
  458. }
  459. file, _ := s.getFile(key)
  460. if file != nil {
  461. return file, nil
  462. }
  463. return nil, fmt.Errorf(errKeeperSecurityInvalidProperty, s.Title, key)
  464. }
  465. func (s *Secret) getFiles() map[string][]byte {
  466. secretData := make(map[string][]byte)
  467. for _, file := range s.Files {
  468. secretData[file.Title] = []byte(file.Content)
  469. }
  470. return secretData
  471. }
  472. func (s *Secret) toString() (string, error) {
  473. secretJSON, err := json.Marshal(s)
  474. if err != nil {
  475. return "", fmt.Errorf(errInvalidJSONSecret, s.Title, err)
  476. }
  477. return string(secretJSON), nil
  478. }