kms.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package alibaba
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "time"
  18. kmssdk "github.com/aliyun/alibaba-cloud-sdk-go/services/kms"
  19. "github.com/tidwall/gjson"
  20. corev1 "k8s.io/api/core/v1"
  21. "k8s.io/apimachinery/pkg/types"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. )
  27. const (
  28. errAlibabaClient = "cannot setup new Alibaba client: %w"
  29. errAlibabaCredSecretName = "invalid Alibaba SecretStore resource: missing Alibaba APIKey"
  30. errUninitalizedAlibabaProvider = "provider Alibaba is not initialized"
  31. errInvalidClusterStoreMissingAKIDNamespace = "invalid ClusterStore, missing AccessKeyID namespace"
  32. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  33. errFetchAKIDSecret = "could not fetch AccessKeyID secret: %w"
  34. errMissingSAK = "missing AccessSecretKey"
  35. errMissingAKID = "missing AccessKeyID"
  36. )
  37. type Client struct {
  38. kube kclient.Client
  39. store *esv1beta1.AlibabaProvider
  40. namespace string
  41. storeKind string
  42. regionID string
  43. keyID []byte
  44. accessKey []byte
  45. }
  46. // https://github.com/external-secrets/external-secrets/issues/644
  47. var _ esv1beta1.SecretsClient = &KeyManagementService{}
  48. var _ esv1beta1.Provider = &KeyManagementService{}
  49. type KeyManagementService struct {
  50. Client SMInterface
  51. url string
  52. }
  53. type SMInterface interface {
  54. GetSecretValue(request *kmssdk.GetSecretValueRequest) (response *kmssdk.GetSecretValueResponse, err error)
  55. }
  56. // setAuth creates a new Alibaba session based on a store.
  57. func (c *Client) setAuth(ctx context.Context) error {
  58. credentialsSecret := &corev1.Secret{}
  59. credentialsSecretName := c.store.Auth.SecretRef.AccessKeyID.Name
  60. if credentialsSecretName == "" {
  61. return fmt.Errorf(errAlibabaCredSecretName)
  62. }
  63. objectKey := types.NamespacedName{
  64. Name: credentialsSecretName,
  65. Namespace: c.namespace,
  66. }
  67. // only ClusterStore is allowed to set namespace (and then it's required)
  68. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  69. if c.store.Auth.SecretRef.AccessKeyID.Namespace == nil {
  70. return fmt.Errorf(errInvalidClusterStoreMissingAKIDNamespace)
  71. }
  72. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeyID.Namespace
  73. }
  74. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  75. if err != nil {
  76. return fmt.Errorf(errFetchAKIDSecret, err)
  77. }
  78. objectKey = types.NamespacedName{
  79. Name: c.store.Auth.SecretRef.AccessKeySecret.Name,
  80. Namespace: c.namespace,
  81. }
  82. if c.storeKind == esv1beta1.ClusterSecretStoreKind {
  83. if c.store.Auth.SecretRef.AccessKeySecret.Namespace == nil {
  84. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  85. }
  86. objectKey.Namespace = *c.store.Auth.SecretRef.AccessKeySecret.Namespace
  87. }
  88. c.keyID = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeyID.Key]
  89. fmt.Println(c.keyID)
  90. fmt.Println(c.accessKey)
  91. if (c.keyID == nil) || (len(c.keyID) == 0) {
  92. return fmt.Errorf(errMissingAKID)
  93. }
  94. c.accessKey = credentialsSecret.Data[c.store.Auth.SecretRef.AccessKeySecret.Key]
  95. if (c.accessKey == nil) || (len(c.accessKey) == 0) {
  96. return fmt.Errorf(errMissingSAK)
  97. }
  98. c.regionID = c.store.RegionID
  99. return nil
  100. }
  101. // Empty GetAllSecrets.
  102. func (kms *KeyManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  103. // TO be implemented
  104. return nil, fmt.Errorf("GetAllSecrets not implemented")
  105. }
  106. // GetSecret returns a single secret from the provider.
  107. func (kms *KeyManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  108. if utils.IsNil(kms.Client) {
  109. return nil, fmt.Errorf(errUninitalizedAlibabaProvider)
  110. }
  111. kmsRequest := kmssdk.CreateGetSecretValueRequest()
  112. kmsRequest.VersionId = ref.Version
  113. kmsRequest.SecretName = ref.Key
  114. kmsRequest.SetScheme("https")
  115. secretOut, err := kms.Client.GetSecretValue(kmsRequest)
  116. if err != nil {
  117. return nil, util.SanitizeErr(err)
  118. }
  119. if ref.Property == "" {
  120. if secretOut.SecretData != "" {
  121. return []byte(secretOut.SecretData), nil
  122. }
  123. return nil, fmt.Errorf("invalid secret received. no secret string nor binary for key: %s", ref.Key)
  124. }
  125. var payload string
  126. if secretOut.SecretData != "" {
  127. payload = secretOut.SecretData
  128. }
  129. val := gjson.Get(payload, ref.Property)
  130. if !val.Exists() {
  131. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  132. }
  133. return []byte(val.String()), nil
  134. }
  135. // GetSecretMap returns multiple k/v pairs from the provider.
  136. func (kms *KeyManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  137. data, err := kms.GetSecret(ctx, ref)
  138. if err != nil {
  139. return nil, err
  140. }
  141. kv := make(map[string]string)
  142. err = json.Unmarshal(data, &kv)
  143. if err != nil {
  144. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  145. }
  146. secretData := make(map[string][]byte)
  147. for k, v := range kv {
  148. secretData[k] = []byte(v)
  149. }
  150. return secretData, nil
  151. }
  152. // NewClient constructs a new secrets client based on the provided store.
  153. func (kms *KeyManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  154. storeSpec := store.GetSpec()
  155. alibabaSpec := storeSpec.Provider.Alibaba
  156. iStore := &Client{
  157. kube: kube,
  158. store: alibabaSpec,
  159. namespace: namespace,
  160. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  161. }
  162. if err := iStore.setAuth(ctx); err != nil {
  163. return nil, err
  164. }
  165. alibabaRegion := iStore.regionID
  166. alibabaKeyID := iStore.keyID
  167. alibabaSecretKey := iStore.accessKey
  168. keyManagementService, err := kmssdk.NewClientWithAccessKey(alibabaRegion, string(alibabaKeyID), string(alibabaSecretKey))
  169. if err != nil {
  170. return nil, fmt.Errorf(errAlibabaClient, err)
  171. }
  172. kms.Client = keyManagementService
  173. kms.url = alibabaSpec.Endpoint
  174. return kms, nil
  175. }
  176. func (kms *KeyManagementService) Close(ctx context.Context) error {
  177. return nil
  178. }
  179. func (kms *KeyManagementService) Validate() (esv1beta1.ValidationResult, error) {
  180. timeout := 15 * time.Second
  181. url := kms.url
  182. if err := utils.NetworkValidate(url, timeout); err != nil {
  183. return esv1beta1.ValidationResultError, err
  184. }
  185. return esv1beta1.ValidationResultReady, nil
  186. }
  187. func (kms *KeyManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  188. storeSpec := store.GetSpec()
  189. alibabaSpec := storeSpec.Provider.Alibaba
  190. regionID := alibabaSpec.RegionID
  191. if regionID == "" {
  192. return fmt.Errorf("missing alibaba region")
  193. }
  194. accessKeyID := alibabaSpec.Auth.SecretRef.AccessKeyID
  195. err := utils.ValidateSecretSelector(store, accessKeyID)
  196. if err != nil {
  197. return err
  198. }
  199. if accessKeyID.Name == "" {
  200. return fmt.Errorf("missing alibaba access ID name")
  201. }
  202. if accessKeyID.Key == "" {
  203. return fmt.Errorf("missing alibaba access ID key")
  204. }
  205. accessKeySecret := alibabaSpec.Auth.SecretRef.AccessKeySecret
  206. err = utils.ValidateSecretSelector(store, accessKeySecret)
  207. if err != nil {
  208. return err
  209. }
  210. if accessKeySecret.Name == "" {
  211. return fmt.Errorf("missing alibaba access key secret name")
  212. }
  213. if accessKeySecret.Key == "" {
  214. return fmt.Errorf("missing alibaba access key secret key")
  215. }
  216. return nil
  217. }
  218. func init() {
  219. esv1beta1.Register(&KeyManagementService{}, &esv1beta1.SecretStoreProvider{
  220. Alibaba: &esv1beta1.AlibabaProvider{},
  221. })
  222. }