provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package ibm
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "strings"
  18. "time"
  19. "github.com/IBM/go-sdk-core/v5/core"
  20. sm "github.com/IBM/secrets-manager-go-sdk/secretsmanagerv1"
  21. corev1 "k8s.io/api/core/v1"
  22. "k8s.io/apimachinery/pkg/types"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  25. "github.com/external-secrets/external-secrets/pkg/provider"
  26. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  27. "github.com/external-secrets/external-secrets/pkg/utils"
  28. )
  29. const (
  30. SecretsManagerEndpointEnv = "IBM_SECRETSMANAGER_ENDPOINT"
  31. STSEndpointEnv = "IBM_STS_ENDPOINT"
  32. SSMEndpointEnv = "IBM_SSM_ENDPOINT"
  33. errIBMClient = "cannot setup new ibm client: %w"
  34. errIBMCredSecretName = "invalid IBM SecretStore resource: missing IBM APIKey"
  35. errUninitalizedIBMProvider = "provider IBM is not initialized"
  36. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  37. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  38. errMissingSAK = "missing SecretAccessKey"
  39. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  40. )
  41. type SecretManagerClient interface {
  42. GetSecret(getSecretOptions *sm.GetSecretOptions) (result *sm.GetSecret, response *core.DetailedResponse, err error)
  43. }
  44. type providerIBM struct {
  45. IBMClient SecretManagerClient
  46. }
  47. type client struct {
  48. kube kclient.Client
  49. store *esv1alpha1.IBMProvider
  50. namespace string
  51. storeKind string
  52. credentials []byte
  53. }
  54. func (c *client) setAuth(ctx context.Context) error {
  55. credentialsSecret := &corev1.Secret{}
  56. credentialsSecretName := c.store.Auth.SecretRef.SecretAPIKey.Name
  57. if credentialsSecretName == "" {
  58. return fmt.Errorf(errIBMCredSecretName)
  59. }
  60. objectKey := types.NamespacedName{
  61. Name: credentialsSecretName,
  62. Namespace: c.namespace,
  63. }
  64. // only ClusterStore is allowed to set namespace (and then it's required)
  65. if c.storeKind == esv1alpha1.ClusterSecretStoreKind {
  66. if c.store.Auth.SecretRef.SecretAPIKey.Namespace == nil {
  67. return fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  68. }
  69. objectKey.Namespace = *c.store.Auth.SecretRef.SecretAPIKey.Namespace
  70. }
  71. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  72. if err != nil {
  73. return fmt.Errorf(errFetchSAKSecret, err)
  74. }
  75. c.credentials = credentialsSecret.Data[c.store.Auth.SecretRef.SecretAPIKey.Key]
  76. if (c.credentials == nil) || (len(c.credentials) == 0) {
  77. return fmt.Errorf(errMissingSAK)
  78. }
  79. return nil
  80. }
  81. func (ibm *providerIBM) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  82. if utils.IsNil(ibm.IBMClient) {
  83. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  84. }
  85. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  86. secretName := ref.Key
  87. nameSplitted := strings.Split(secretName, "/")
  88. if len(nameSplitted) > 1 {
  89. secretType = nameSplitted[0]
  90. secretName = nameSplitted[1]
  91. }
  92. switch secretType {
  93. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  94. return getArbitrarySecret(ibm, &secretName)
  95. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  96. if ref.Property == "" {
  97. return nil, fmt.Errorf("remoteRef.property required for secret type username_password")
  98. }
  99. return getUsernamePasswordSecret(ibm, &secretName, ref)
  100. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  101. return getIamCredentialsSecret(ibm, &secretName)
  102. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  103. if ref.Property == "" {
  104. return nil, fmt.Errorf("remoteRef.property required for secret type imported_cert")
  105. }
  106. return getImportCertSecret(ibm, &secretName, ref)
  107. default:
  108. return nil, fmt.Errorf("unknown secret type %s", secretType)
  109. }
  110. }
  111. func getArbitrarySecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  112. response, _, err := ibm.IBMClient.GetSecret(
  113. &sm.GetSecretOptions{
  114. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  115. ID: secretName,
  116. })
  117. if err != nil {
  118. return nil, err
  119. }
  120. secret := response.Resources[0].(*sm.SecretResource)
  121. secretData := secret.SecretData.(map[string]interface{})
  122. arbitrarySecretPayload := secretData["payload"].(string)
  123. return []byte(arbitrarySecretPayload), nil
  124. }
  125. func getImportCertSecret(ibm *providerIBM, secretName *string, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  126. response, _, err := ibm.IBMClient.GetSecret(
  127. &sm.GetSecretOptions{
  128. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  129. ID: secretName,
  130. })
  131. if err != nil {
  132. return nil, err
  133. }
  134. secret := response.Resources[0].(*sm.SecretResource)
  135. secretData := secret.SecretData.(map[string]interface{})
  136. if val, ok := secretData[ref.Property]; ok {
  137. return []byte(val.(string)), nil
  138. }
  139. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  140. }
  141. func getIamCredentialsSecret(ibm *providerIBM, secretName *string) ([]byte, error) {
  142. response, _, err := ibm.IBMClient.GetSecret(
  143. &sm.GetSecretOptions{
  144. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  145. ID: secretName,
  146. })
  147. if err != nil {
  148. return nil, err
  149. }
  150. secret := response.Resources[0].(*sm.SecretResource)
  151. secretData := *secret.APIKey
  152. return []byte(secretData), nil
  153. }
  154. func getUsernamePasswordSecret(ibm *providerIBM, secretName *string, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  155. response, _, err := ibm.IBMClient.GetSecret(
  156. &sm.GetSecretOptions{
  157. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  158. ID: secretName,
  159. })
  160. if err != nil {
  161. return nil, err
  162. }
  163. secret := response.Resources[0].(*sm.SecretResource)
  164. secretData := secret.SecretData.(map[string]interface{})
  165. if val, ok := secretData[ref.Property]; ok {
  166. return []byte(val.(string)), nil
  167. }
  168. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  169. }
  170. func (ibm *providerIBM) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  171. if utils.IsNil(ibm.IBMClient) {
  172. return nil, fmt.Errorf(errUninitalizedIBMProvider)
  173. }
  174. secretType := sm.GetSecretOptionsSecretTypeArbitraryConst
  175. secretName := ref.Key
  176. nameSplitted := strings.Split(secretName, "/")
  177. if len(nameSplitted) > 1 {
  178. secretType = nameSplitted[0]
  179. secretName = nameSplitted[1]
  180. }
  181. switch secretType {
  182. case sm.GetSecretOptionsSecretTypeArbitraryConst:
  183. response, _, err := ibm.IBMClient.GetSecret(
  184. &sm.GetSecretOptions{
  185. SecretType: core.StringPtr(sm.GetSecretOptionsSecretTypeArbitraryConst),
  186. ID: &ref.Key,
  187. })
  188. if err != nil {
  189. return nil, err
  190. }
  191. secret := response.Resources[0].(*sm.SecretResource)
  192. secretData := secret.SecretData.(map[string]interface{})
  193. arbitrarySecretPayload := secretData["payload"].(string)
  194. kv := make(map[string]interface{})
  195. err = json.Unmarshal([]byte(arbitrarySecretPayload), &kv)
  196. if err != nil {
  197. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  198. }
  199. secretMap := byteArrayMap(kv)
  200. return secretMap, nil
  201. case sm.CreateSecretOptionsSecretTypeUsernamePasswordConst:
  202. response, _, err := ibm.IBMClient.GetSecret(
  203. &sm.GetSecretOptions{
  204. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeUsernamePasswordConst),
  205. ID: &secretName,
  206. })
  207. if err != nil {
  208. return nil, err
  209. }
  210. secret := response.Resources[0].(*sm.SecretResource)
  211. secretData := secret.SecretData.(map[string]interface{})
  212. secretMap := byteArrayMap(secretData)
  213. return secretMap, nil
  214. case sm.CreateSecretOptionsSecretTypeIamCredentialsConst:
  215. response, _, err := ibm.IBMClient.GetSecret(
  216. &sm.GetSecretOptions{
  217. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeIamCredentialsConst),
  218. ID: &secretName,
  219. })
  220. if err != nil {
  221. return nil, err
  222. }
  223. secret := response.Resources[0].(*sm.SecretResource)
  224. secretData := *secret.APIKey
  225. secretMap := make(map[string][]byte)
  226. secretMap["apikey"] = []byte(secretData)
  227. return secretMap, nil
  228. case sm.CreateSecretOptionsSecretTypeImportedCertConst:
  229. response, _, err := ibm.IBMClient.GetSecret(
  230. &sm.GetSecretOptions{
  231. SecretType: core.StringPtr(sm.CreateSecretOptionsSecretTypeImportedCertConst),
  232. ID: &secretName,
  233. })
  234. if err != nil {
  235. return nil, err
  236. }
  237. secret := response.Resources[0].(*sm.SecretResource)
  238. secretData := secret.SecretData.(map[string]interface{})
  239. secretMap := byteArrayMap(secretData)
  240. return secretMap, nil
  241. default:
  242. return nil, fmt.Errorf("unknown secret type %s", secretType)
  243. }
  244. }
  245. func byteArrayMap(secretData map[string]interface{}) map[string][]byte {
  246. secretMap := make(map[string][]byte)
  247. for k, v := range secretData {
  248. secretMap[k] = []byte(v.(string))
  249. }
  250. return secretMap
  251. }
  252. func (ibm *providerIBM) Close(ctx context.Context) error {
  253. return nil
  254. }
  255. func (ibm *providerIBM) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  256. storeSpec := store.GetSpec()
  257. ibmSpec := storeSpec.Provider.IBM
  258. iStore := &client{
  259. kube: kube,
  260. store: ibmSpec,
  261. namespace: namespace,
  262. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  263. }
  264. if err := iStore.setAuth(ctx); err != nil {
  265. return nil, err
  266. }
  267. secretsManager, err := sm.NewSecretsManagerV1(&sm.SecretsManagerV1Options{
  268. URL: *storeSpec.Provider.IBM.ServiceURL,
  269. Authenticator: &core.IamAuthenticator{
  270. ApiKey: string(iStore.credentials),
  271. },
  272. })
  273. // Setup retry options, but only if present
  274. if storeSpec.RetrySettings != nil {
  275. var retryAmount int
  276. var retryDuration time.Duration
  277. if storeSpec.RetrySettings.MaxRetries != nil {
  278. retryAmount = int(*storeSpec.RetrySettings.MaxRetries)
  279. } else {
  280. retryAmount = 3
  281. }
  282. if storeSpec.RetrySettings.RetryInterval != nil {
  283. retryDuration, err = time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  284. } else {
  285. retryDuration = 5 * time.Second
  286. }
  287. if err == nil {
  288. secretsManager.Service.EnableRetries(retryAmount, retryDuration)
  289. }
  290. }
  291. if err != nil {
  292. return nil, fmt.Errorf(errIBMClient, err)
  293. }
  294. ibm.IBMClient = secretsManager
  295. return ibm, nil
  296. }
  297. func init() {
  298. schema.Register(&providerIBM{}, &esv1alpha1.SecretStoreProvider{
  299. IBM: &esv1alpha1.IBMProvider{},
  300. })
  301. }