provider.go 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package secretserver
  13. import (
  14. "context"
  15. "errors"
  16. "github.com/DelineaXPM/tss-sdk-go/v2/server"
  17. kubeClient "sigs.k8s.io/controller-runtime/pkg/client"
  18. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  19. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  20. "github.com/external-secrets/external-secrets/pkg/utils"
  21. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  22. )
  23. var (
  24. errEmptyUserName = errors.New("username must not be empty")
  25. errEmptyPassword = errors.New("password must be set")
  26. errEmptyServerURL = errors.New("serverURL must be set")
  27. errSecretRefAndValueConflict = errors.New("cannot specify both secret reference and value")
  28. errSecretRefAndValueMissing = errors.New("must specify either secret reference or direct value")
  29. errMissingStore = errors.New("missing store specification")
  30. errInvalidSpec = errors.New("invalid specification for secret server provider")
  31. errClusterStoreRequiresNamespace = errors.New("when using a ClusterSecretStore, namespaces must be explicitly set")
  32. errMissingSecretName = errors.New("must specify a secret name")
  33. errMissingSecretKey = errors.New("must specify a secret key")
  34. )
  35. type Provider struct{}
  36. var _ esv1beta1.Provider = &Provider{}
  37. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  38. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  39. return esv1beta1.SecretStoreReadOnly
  40. }
  41. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kubeClient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  42. cfg, err := getConfig(store)
  43. if err != nil {
  44. return nil, err
  45. }
  46. if store.GetKind() == esv1beta1.ClusterSecretStoreKind && doesConfigDependOnNamespace(cfg) {
  47. // we are not attached to a specific namespace, but some config values are dependent on it
  48. return nil, errClusterStoreRequiresNamespace
  49. }
  50. username, err := loadConfigSecret(ctx, store.GetKind(), cfg.Username, kube, namespace)
  51. if err != nil {
  52. return nil, err
  53. }
  54. password, err := loadConfigSecret(ctx, store.GetKind(), cfg.Password, kube, namespace)
  55. if err != nil {
  56. return nil, err
  57. }
  58. secretServer, err := server.New(server.Configuration{
  59. Credentials: server.UserCredential{
  60. Username: username,
  61. Password: password,
  62. },
  63. ServerURL: cfg.ServerURL,
  64. })
  65. if err != nil {
  66. return nil, err
  67. }
  68. return &client{
  69. api: secretServer,
  70. }, nil
  71. }
  72. func loadConfigSecret(
  73. ctx context.Context,
  74. storeKind string,
  75. ref *esv1beta1.SecretServerProviderRef,
  76. kube kubeClient.Client,
  77. namespace string) (string, error) {
  78. if ref.SecretRef == nil {
  79. return ref.Value, nil
  80. }
  81. if err := validateSecretRef(ref); err != nil {
  82. return "", err
  83. }
  84. return resolvers.SecretKeyRef(ctx, kube, storeKind, namespace, ref.SecretRef)
  85. }
  86. func validateStoreSecretRef(store esv1beta1.GenericStore, ref *esv1beta1.SecretServerProviderRef) error {
  87. if ref.SecretRef != nil {
  88. if err := utils.ValidateReferentSecretSelector(store, *ref.SecretRef); err != nil {
  89. return err
  90. }
  91. }
  92. return validateSecretRef(ref)
  93. }
  94. func validateSecretRef(ref *esv1beta1.SecretServerProviderRef) error {
  95. if ref.SecretRef != nil {
  96. if ref.Value != "" {
  97. return errSecretRefAndValueConflict
  98. }
  99. if ref.SecretRef.Name == "" {
  100. return errMissingSecretName
  101. }
  102. if ref.SecretRef.Key == "" {
  103. return errMissingSecretKey
  104. }
  105. } else if ref.Value == "" {
  106. return errSecretRefAndValueMissing
  107. }
  108. return nil
  109. }
  110. func doesConfigDependOnNamespace(cfg *esv1beta1.SecretServerProvider) bool {
  111. if cfg.Username.SecretRef != nil && cfg.Username.SecretRef.Namespace == nil {
  112. return true
  113. }
  114. if cfg.Password.SecretRef != nil && cfg.Password.SecretRef.Namespace == nil {
  115. return true
  116. }
  117. return false
  118. }
  119. func getConfig(store esv1beta1.GenericStore) (*esv1beta1.SecretServerProvider, error) {
  120. if store == nil {
  121. return nil, errMissingStore
  122. }
  123. storeSpec := store.GetSpec()
  124. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.SecretServer == nil {
  125. return nil, errInvalidSpec
  126. }
  127. cfg := storeSpec.Provider.SecretServer
  128. if cfg.Username == nil {
  129. return nil, errEmptyUserName
  130. }
  131. if cfg.Password == nil {
  132. return nil, errEmptyPassword
  133. }
  134. if cfg.ServerURL == "" {
  135. return nil, errEmptyServerURL
  136. }
  137. err := validateStoreSecretRef(store, cfg.Username)
  138. if err != nil {
  139. return nil, err
  140. }
  141. err = validateStoreSecretRef(store, cfg.Password)
  142. if err != nil {
  143. return nil, err
  144. }
  145. return cfg, nil
  146. }
  147. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  148. _, err := getConfig(store)
  149. return nil, err
  150. }
  151. func init() {
  152. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  153. SecretServer: &esv1beta1.SecretServerProvider{},
  154. })
  155. }