kms.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package alibaba
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. kmssdk "github.com/aliyun/alibaba-cloud-sdk-go/services/kms"
  18. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  19. "github.com/external-secrets/external-secrets/pkg/provider"
  20. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  21. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  22. "github.com/tidwall/gjson"
  23. corev1 "k8s.io/api/core/v1"
  24. "k8s.io/apimachinery/pkg/types"
  25. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. )
  27. const (
  28. SecretsManagerEndpointEnv = "Alibaba_SECRETSMANAGER_ENDPOINT"
  29. STSEndpointEnv = "Alibaba_STS_ENDPOINT"
  30. SSMEndpointEnv = "Alibaba_SSM_ENDPOINT"
  31. errAlibabaClient = "cannot setup new Alibaba client: %w"
  32. errAlibabaCredSecretName = "invalid Alibaba SecretStore resource: missing Alibaba APIKey"
  33. errInvalidClusterStoreMissingAKIDNamespace = "invalid ClusterStore, missing AccessKeyID namespace"
  34. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  35. errFetchSAKSecret = "could not fetch AccessSecretKey secret: %w"
  36. errFetchAKIDSecret = "could not fetch AccessKeyID secret: %w"
  37. errMissingSAK = "missing AccessSecretKey"
  38. errMissingAKID = "missing AccessKeyID"
  39. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  40. )
  41. type Client struct {
  42. kube kclient.Client
  43. store *esv1alpha1.AlibabaProvider
  44. namespace string
  45. storeKind string
  46. regionID string
  47. keyID []byte
  48. accessKey []byte
  49. }
  50. type KeyManagementService struct {
  51. Client SMInterface
  52. }
  53. type SMInterface interface {
  54. GetSecretValue(request *kmssdk.GetSecretValueRequest) (response *kmssdk.GetSecretValueResponse, err error)
  55. }
  56. //setAuth creates a new Alibaba session based on a store
  57. func (c *Client) setAuth(ctx context.Context) error {
  58. credentialsSecret := &corev1.Secret{}
  59. credentialsSecretName := c.store.Auth.SecretRef.AccessKeyID.Name
  60. if credentialsSecretName == "" {
  61. return fmt.Errorf(errAlibabaCredSecretName)
  62. }
  63. objectKey := types.NamespacedName{
  64. Name: credentialsSecretName,
  65. Namespace: c.namespace,
  66. }
  67. // only ClusterStore is allowed to set namespace (and then it's required)
  68. if c.storeKind == esv1alpha1.ClusterSecretStoreKind {
  69. if c.store.Auth.SecretRef.AccessKeyID.Namespace == nil {
  70. return fmt.Errorf(errInvalidClusterStoreMissingAKIDNamespace)
  71. }
  72. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeyID.Namespace
  73. }
  74. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  75. if err != nil {
  76. return fmt.Errorf(errFetchAKIDSecret, err)
  77. }
  78. objectKey = types.NamespacedName{
  79. Name: c.store.Auth.SecretRef.AccessKeySecret.Name,
  80. Namespace: c.namespace,
  81. }
  82. if c.storeKind == esv1alpha1.ClusterSecretStoreKind {
  83. if c.store.Auth.SecretRef.AccessKeySecret.Namespace == nil {
  84. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  85. }
  86. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeySecret.Namespace
  87. }
  88. c.keyID = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeyID.Key]
  89. fmt.Println(c.keyID)
  90. fmt.Println(c.accessKey)
  91. if (c.keyID == nil) || (len(c.keyID) == 0) {
  92. return fmt.Errorf(errMissingAKID)
  93. }
  94. fmt.Println("GetAuth: KEYID")
  95. c.accessKey = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeySecret.Key]
  96. if (c.accessKey == nil) || (len(c.accessKey) == 0) {
  97. return fmt.Errorf(errMissingSAK)
  98. }
  99. fmt.Println("GetAuth: ACCESSKEY")
  100. c.regionID = c.store.RegionID
  101. fmt.Println("GetAuth: REGIONID")
  102. return nil
  103. }
  104. // GetSecret returns a single secret from the provider.
  105. func (kms *KeyManagementService) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  106. kmsRequest := kmssdk.CreateGetSecretValueRequest()
  107. kmsRequest.VersionId = ref.Version
  108. kmsRequest.SecretName = ref.Key
  109. fmt.Println(kmsRequest)
  110. kmsRequest.SetScheme("https")
  111. secretOut, err := kms.Client.GetSecretValue(kmsRequest)
  112. if err != nil {
  113. return nil, util.SanitizeErr(err)
  114. }
  115. fmt.Println("After GetSecretValue")
  116. if ref.Property == "" {
  117. if secretOut.SecretData != "" {
  118. return []byte(secretOut.SecretData), nil
  119. }
  120. return nil, fmt.Errorf("invalid secret received. no secret string nor binary for key: %s", ref.Key)
  121. }
  122. fmt.Println("ref.Property != ")
  123. var payload string
  124. if secretOut.SecretData != "" {
  125. payload = secretOut.SecretData
  126. }
  127. fmt.Println("GetSecret: FIRST CHECKPOINT")
  128. val := gjson.Get(payload, ref.Property)
  129. if !val.Exists() {
  130. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  131. }
  132. fmt.Println("GetSecret: SECOND CHECKPOINT")
  133. return []byte(val.String()), nil
  134. }
  135. // GetSecretMap returns multiple k/v pairs from the provider.
  136. func (kms *KeyManagementService) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  137. data, err := kms.GetSecret(ctx, ref)
  138. if err != nil {
  139. return nil, err
  140. }
  141. kv := make(map[string]string)
  142. err = json.Unmarshal(data, &kv)
  143. if err != nil {
  144. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  145. }
  146. secretData := make(map[string][]byte)
  147. for k, v := range kv {
  148. secretData[k] = []byte(v)
  149. }
  150. return secretData, nil
  151. }
  152. //NewClient constructs a new secrets client based on the provided store.
  153. func (kms *KeyManagementService) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  154. storeSpec := store.GetSpec()
  155. alibabaSpec := storeSpec.Provider.Alibaba
  156. iStore := &Client{
  157. kube: kube,
  158. store: alibabaSpec,
  159. namespace: namespace,
  160. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  161. }
  162. if err := iStore.setAuth(ctx); err != nil {
  163. return nil, err
  164. }
  165. alibabaRegion := iStore.regionID
  166. fmt.Println("NewClient: REGIONID")
  167. alibabaKeyID := iStore.keyID
  168. fmt.Println("NewClient: KEYID")
  169. alibabaSecretKey := iStore.accessKey
  170. fmt.Println("NewClient: ACCESSKEY")
  171. keyManagementService, err := kmssdk.NewClientWithAccessKey(alibabaRegion, string(alibabaKeyID), string(alibabaSecretKey))
  172. if err != nil {
  173. return nil, fmt.Errorf(errAlibabaClient, err)
  174. }
  175. kms.Client = keyManagementService
  176. fmt.Println("Before printing kms")
  177. return kms, nil
  178. }
  179. func (kms *KeyManagementService) Close() error {
  180. return nil
  181. }
  182. func init() {
  183. schema.Register(&KeyManagementService{}, &esv1alpha1.SecretStoreProvider{
  184. Alibaba: &esv1alpha1.AlibabaProvider{},
  185. })
  186. }