csm_client.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package adapter provides the adapter implementation for CloudRU Secret Manager.
  14. package adapter
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "sync"
  20. "time"
  21. iamAuthV1 "github.com/cloudru-tech/iam-sdk/api/auth/v1"
  22. smssdk "github.com/cloudru-tech/secret-manager-sdk"
  23. smsV1 "github.com/cloudru-tech/secret-manager-sdk/api/v1"
  24. smsV2 "github.com/cloudru-tech/secret-manager-sdk/api/v2"
  25. "google.golang.org/grpc/codes"
  26. "google.golang.org/grpc/metadata"
  27. "google.golang.org/grpc/status"
  28. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  29. )
  30. const errUnauthorized = "unauthorized: %w"
  31. // CredentialsResolver returns the actual client credentials.
  32. type CredentialsResolver interface {
  33. Resolve(ctx context.Context) (*Credentials, error)
  34. }
  35. // APIClient - Cloudru Secret Manager Service Client.
  36. type APIClient struct {
  37. cr CredentialsResolver
  38. iamClient iamAuthV1.AuthServiceClient
  39. smsClient *smssdk.Client
  40. mu sync.Mutex
  41. accessToken string
  42. accessTokenExpiresAt time.Time
  43. }
  44. // ListSecretsRequest is a request to list secrets.
  45. type ListSecretsRequest struct {
  46. ProjectID string
  47. Labels map[string]string
  48. NameExact string
  49. NameRegex string
  50. }
  51. // Credentials holds the keyID and secret for the CSM client.
  52. type Credentials struct {
  53. KeyID string
  54. Secret string
  55. }
  56. // NewCredentials creates a new Credentials object.
  57. func NewCredentials(kid, secret string) (*Credentials, error) {
  58. if kid == "" || secret == "" {
  59. return nil, errors.New("keyID and secret must be provided")
  60. }
  61. return &Credentials{KeyID: kid, Secret: secret}, nil
  62. }
  63. // NewAPIClient creates a new grpc SecretManager client.
  64. func NewAPIClient(cr CredentialsResolver, iamClient iamAuthV1.AuthServiceClient, client *smssdk.Client) *APIClient {
  65. return &APIClient{
  66. cr: cr,
  67. iamClient: iamClient,
  68. smsClient: client,
  69. }
  70. }
  71. // ListSecrets retrieves a list of secrets from CloudRU Secret Manager.
  72. func (c *APIClient) ListSecrets(ctx context.Context, req *ListSecretsRequest) ([]*smsV2.Secret, error) {
  73. searchReq := &smsV2.SearchSecretRequest{
  74. ProjectId: req.ProjectID,
  75. Labels: req.Labels,
  76. Depth: -1,
  77. }
  78. switch {
  79. case req.NameExact != "":
  80. searchReq.Name = &smsV2.SearchSecretRequest_Exact{Exact: req.NameExact}
  81. case req.NameRegex != "":
  82. searchReq.Name = &smsV2.SearchSecretRequest_Regex{Regex: req.NameRegex}
  83. }
  84. var err error
  85. ctx, err = c.authCtx(ctx)
  86. if err != nil {
  87. return nil, fmt.Errorf(errUnauthorized, err)
  88. }
  89. resp, err := c.smsClient.V2.SecretService.Search(ctx, searchReq)
  90. if err != nil {
  91. return nil, err
  92. }
  93. return resp.Secrets, nil
  94. }
  95. // AccessSecretVersionByPath retrieves a secret version by its path from CloudRU Secret Manager.
  96. func (c *APIClient) AccessSecretVersionByPath(ctx context.Context, projectID, path string, version *int32) ([]byte, error) {
  97. var err error
  98. ctx, err = c.authCtx(ctx)
  99. if err != nil {
  100. return nil, fmt.Errorf(errUnauthorized, err)
  101. }
  102. req := &smsV2.AccessSecretRequest{
  103. ProjectId: projectID,
  104. Path: path,
  105. Version: version,
  106. }
  107. secret, err := c.smsClient.V2.SecretService.Access(ctx, req)
  108. if err != nil {
  109. st, _ := status.FromError(err)
  110. if st.Code() == codes.NotFound {
  111. return nil, esv1.NoSecretErr
  112. }
  113. return nil, fmt.Errorf("failed to get the secret by path '%s': %w", path, err)
  114. }
  115. return secret.GetPayload().GetValue(), nil
  116. }
  117. // AccessSecretVersion retrieves a specific version of a secret from CloudRU Secret Manager.
  118. func (c *APIClient) AccessSecretVersion(ctx context.Context, id, version string) ([]byte, error) {
  119. var err error
  120. ctx, err = c.authCtx(ctx)
  121. if err != nil {
  122. return nil, fmt.Errorf(errUnauthorized, err)
  123. }
  124. if version == "" {
  125. version = "latest"
  126. }
  127. req := &smsV1.AccessSecretVersionRequest{
  128. SecretId: id,
  129. SecretVersionId: version,
  130. }
  131. secret, err := c.smsClient.SecretService.AccessSecretVersion(ctx, req)
  132. if err != nil {
  133. st, _ := status.FromError(err)
  134. if st.Code() == codes.NotFound {
  135. return nil, esv1.NoSecretErr
  136. }
  137. return nil, fmt.Errorf("failed to get the secret by id '%s v%s': %w", id, version, err)
  138. }
  139. return secret.GetData().GetValue(), nil
  140. }
  141. func (c *APIClient) authCtx(ctx context.Context) (context.Context, error) {
  142. md, ok := metadata.FromOutgoingContext(ctx)
  143. if !ok {
  144. md = metadata.New(map[string]string{})
  145. }
  146. token, err := c.getOrCreateToken(ctx)
  147. if err != nil {
  148. return ctx, fmt.Errorf("fetch IAM access token: %w", err)
  149. }
  150. md.Set("authorization", "Bearer "+token)
  151. return metadata.NewOutgoingContext(ctx, md), nil
  152. }
  153. func (c *APIClient) getOrCreateToken(ctx context.Context) (string, error) {
  154. c.mu.Lock()
  155. defer c.mu.Unlock()
  156. if c.accessToken != "" && c.accessTokenExpiresAt.After(time.Now()) {
  157. return c.accessToken, nil
  158. }
  159. creds, err := c.cr.Resolve(ctx)
  160. if err != nil {
  161. return "", fmt.Errorf("resolve API credentials: %w", err)
  162. }
  163. resp, err := c.iamClient.GetToken(ctx, &iamAuthV1.GetTokenRequest{KeyId: creds.KeyID, Secret: creds.Secret})
  164. if err != nil {
  165. return "", fmt.Errorf("get access token: %w", err)
  166. }
  167. c.accessToken = resp.AccessToken
  168. c.accessTokenExpiresAt = time.Now().Add(time.Second * time.Duration(resp.ExpiresIn))
  169. return c.accessToken, nil
  170. }