oracle.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "os"
  21. "regexp"
  22. "sync"
  23. "time"
  24. "github.com/oracle/oci-go-sdk/v65/common"
  25. "github.com/oracle/oci-go-sdk/v65/common/auth"
  26. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  27. "github.com/oracle/oci-go-sdk/v65/secrets"
  28. "github.com/oracle/oci-go-sdk/v65/vault"
  29. "github.com/tidwall/gjson"
  30. corev1 "k8s.io/api/core/v1"
  31. "k8s.io/client-go/kubernetes"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  34. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  35. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  36. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  37. "github.com/external-secrets/external-secrets/pkg/utils"
  38. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  39. )
  40. const (
  41. errOracleClient = "cannot setup new oracle client: %w"
  42. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  43. errUninitalizedOracleProvider = "provider oracle is not initialized"
  44. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  45. errMissingPK = "missing PrivateKey"
  46. errMissingUser = "missing User ID"
  47. errMissingTenancy = "missing Tenancy ID"
  48. errMissingRegion = "missing Region"
  49. errMissingFingerprint = "missing Fingerprint"
  50. errMissingVault = "missing Vault"
  51. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  52. errMissingKey = "missing Key in secret: %s"
  53. errUnexpectedContent = "unexpected secret bundle content"
  54. )
  55. // https://github.com/external-secrets/external-secrets/issues/644
  56. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  57. var _ esv1beta1.Provider = &VaultManagementService{}
  58. type VaultManagementService struct {
  59. Client VMInterface
  60. KmsVaultClient KmsVCInterface
  61. VaultClient VaultInterface
  62. vault string
  63. compartment string
  64. encryptionKey string
  65. workloadIdentityMutex sync.Mutex
  66. }
  67. type VMInterface interface {
  68. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  69. }
  70. type KmsVCInterface interface {
  71. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  72. }
  73. type VaultInterface interface {
  74. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  75. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  76. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  77. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  78. }
  79. const (
  80. SecretNotFound = iota
  81. SecretExists
  82. SecretAPIError
  83. )
  84. func (vms *VaultManagementService) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  85. if data.GetSecretKey() == "" {
  86. return fmt.Errorf("pushing the whole secret is not yet implemented")
  87. }
  88. value := secret.Data[data.GetSecretKey()]
  89. secretName := data.GetRemoteKey()
  90. encodedValue := base64.StdEncoding.EncodeToString(value)
  91. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  92. switch action {
  93. case SecretNotFound:
  94. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  95. CreateSecretDetails: vault.CreateSecretDetails{
  96. CompartmentId: &vms.compartment,
  97. KeyId: &vms.encryptionKey,
  98. SecretContent: vault.Base64SecretContentDetails{
  99. Content: &encodedValue,
  100. },
  101. SecretName: &secretName,
  102. VaultId: &vms.vault,
  103. },
  104. })
  105. return sanitizeOCISDKErr(err)
  106. case SecretExists:
  107. payload, err := decodeBundle(sec)
  108. if err != nil {
  109. return err
  110. }
  111. if bytes.Equal(payload, value) {
  112. return nil
  113. }
  114. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  115. SecretId: sec.SecretId,
  116. UpdateSecretDetails: vault.UpdateSecretDetails{
  117. SecretContent: vault.Base64SecretContentDetails{
  118. Content: &encodedValue,
  119. },
  120. },
  121. })
  122. return sanitizeOCISDKErr(err)
  123. default:
  124. return sanitizeOCISDKErr(err)
  125. }
  126. }
  127. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  128. secretName := remoteRef.GetRemoteKey()
  129. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  130. switch action {
  131. case SecretNotFound:
  132. return nil
  133. case SecretExists:
  134. if resp.TimeOfDeletion != nil {
  135. return nil
  136. }
  137. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  138. SecretId: resp.SecretId,
  139. })
  140. return sanitizeOCISDKErr(err)
  141. default:
  142. return sanitizeOCISDKErr(err)
  143. }
  144. }
  145. func (vms *VaultManagementService) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  146. return false, fmt.Errorf("not implemented")
  147. }
  148. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  149. var page *string
  150. var summaries []vault.SecretSummary
  151. for {
  152. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  153. CompartmentId: &vms.compartment,
  154. Page: page,
  155. VaultId: &vms.vault,
  156. })
  157. if err != nil {
  158. return nil, sanitizeOCISDKErr(err)
  159. }
  160. summaries = append(summaries, resp.Items...)
  161. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  162. break
  163. }
  164. }
  165. return vms.filteredSummaryResult(ctx, summaries, ref)
  166. }
  167. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  168. if utils.IsNil(vms.Client) {
  169. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  170. }
  171. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  172. VaultId: &vms.vault,
  173. SecretName: &ref.Key,
  174. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  175. })
  176. if err != nil {
  177. return nil, sanitizeOCISDKErr(err)
  178. }
  179. payload, err := decodeBundle(sec)
  180. if err != nil {
  181. return nil, err
  182. }
  183. if ref.Property == "" {
  184. return payload, nil
  185. }
  186. val := gjson.Get(string(payload), ref.Property)
  187. if !val.Exists() {
  188. return nil, fmt.Errorf(errMissingKey, ref.Key)
  189. }
  190. return []byte(val.String()), nil
  191. }
  192. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  193. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  194. if !ok {
  195. return nil, fmt.Errorf(errUnexpectedContent)
  196. }
  197. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  198. if err != nil {
  199. return nil, err
  200. }
  201. return payload, nil
  202. }
  203. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  204. data, err := vms.GetSecret(ctx, ref)
  205. if err != nil {
  206. return nil, sanitizeOCISDKErr(err)
  207. }
  208. kv := make(map[string]string)
  209. err = json.Unmarshal(data, &kv)
  210. if err != nil {
  211. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  212. }
  213. secretData := make(map[string][]byte)
  214. for k, v := range kv {
  215. secretData[k] = []byte(v)
  216. }
  217. return secretData, nil
  218. }
  219. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  220. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  221. return esv1beta1.SecretStoreReadOnly
  222. }
  223. // NewClient constructs a new secrets client based on the provided store.
  224. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  225. storeSpec := store.GetSpec()
  226. oracleSpec := storeSpec.Provider.Oracle
  227. if oracleSpec.Vault == "" {
  228. return nil, fmt.Errorf(errMissingVault)
  229. }
  230. if oracleSpec.Region == "" {
  231. return nil, fmt.Errorf(errMissingRegion)
  232. }
  233. var (
  234. err error
  235. configurationProvider common.ConfigurationProvider
  236. )
  237. if oracleSpec.PrincipalType == esv1beta1.WorkloadPrincipal {
  238. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  239. } else if oracleSpec.PrincipalType == esv1beta1.InstancePrincipal || oracleSpec.Auth == nil {
  240. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  241. } else {
  242. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  243. }
  244. if err != nil {
  245. return nil, fmt.Errorf(errOracleClient, err)
  246. }
  247. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  248. if err != nil {
  249. return nil, fmt.Errorf(errOracleClient, err)
  250. }
  251. secretManagementService.SetRegion(oracleSpec.Region)
  252. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  253. if err != nil {
  254. return nil, fmt.Errorf(errOracleClient, err)
  255. }
  256. kmsVaultClient.SetRegion(oracleSpec.Region)
  257. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  258. if err != nil {
  259. return nil, fmt.Errorf(errOracleClient, err)
  260. }
  261. vaultClient.SetRegion(oracleSpec.Region)
  262. if storeSpec.RetrySettings != nil {
  263. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  264. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  265. opts = append(opts, common.WithMaximumNumberAttempts(uint(*mr)))
  266. }
  267. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  268. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  269. if err != nil {
  270. return nil, fmt.Errorf(errOracleClient, err)
  271. }
  272. opts = append(opts, common.WithFixedBackoff(i))
  273. }
  274. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  275. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  276. RetryPolicy: &customRetryPolicy,
  277. })
  278. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  279. RetryPolicy: &customRetryPolicy,
  280. })
  281. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  282. RetryPolicy: &customRetryPolicy,
  283. })
  284. }
  285. return &VaultManagementService{
  286. Client: secretManagementService,
  287. KmsVaultClient: kmsVaultClient,
  288. VaultClient: vaultClient,
  289. vault: oracleSpec.Vault,
  290. compartment: oracleSpec.Compartment,
  291. encryptionKey: oracleSpec.EncryptionKey,
  292. }, nil
  293. }
  294. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  295. // Try to look up the secret, which will determine if we should create or update the secret.
  296. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  297. SecretName: &secretName,
  298. VaultId: &vms.vault,
  299. })
  300. // Get a PushSecret action depending on the ListSecrets response.
  301. action := getSecretBundleCode(err)
  302. return resp, action, err
  303. }
  304. func getSecretBundleCode(err error) int {
  305. if err != nil {
  306. // If we got a 404 service error, try to create the secret.
  307. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  308. return SecretNotFound
  309. }
  310. return SecretAPIError
  311. }
  312. // Otherwise, update the existing secret.
  313. return SecretExists
  314. }
  315. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  316. secretMap := map[string][]byte{}
  317. for _, summary := range secretSummaries {
  318. matches, err := matchesRef(summary, ref)
  319. if err != nil {
  320. return nil, err
  321. }
  322. if !matches || summary.TimeOfDeletion != nil {
  323. continue
  324. }
  325. secret, err := vms.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{
  326. Key: *summary.SecretName,
  327. })
  328. if err != nil {
  329. return nil, err
  330. }
  331. secretMap[*summary.SecretName] = secret
  332. }
  333. return secretMap, nil
  334. }
  335. func matchesRef(secretSummary vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (bool, error) {
  336. if ref.Name != nil {
  337. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  338. if err != nil {
  339. return false, err
  340. }
  341. return matchString, nil
  342. }
  343. for k, v := range ref.Tags {
  344. if val, ok := secretSummary.FreeformTags[k]; ok {
  345. if val == v {
  346. return true, nil
  347. }
  348. }
  349. }
  350. return false, nil
  351. }
  352. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  353. if secretRef.Name == "" {
  354. return "", fmt.Errorf(errORACLECredSecretName)
  355. }
  356. secret, err := resolvers.SecretKeyRef(
  357. ctx,
  358. kube,
  359. storeKind,
  360. namespace,
  361. &secretRef,
  362. )
  363. if err != nil {
  364. return "", fmt.Errorf(errFetchSAKSecret, err)
  365. }
  366. return secret, nil
  367. }
  368. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  369. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  370. if err != nil {
  371. return nil, err
  372. }
  373. if privateKey == "" {
  374. return nil, fmt.Errorf(errMissingPK)
  375. }
  376. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  377. if err != nil {
  378. return nil, err
  379. }
  380. if fingerprint == "" {
  381. return nil, fmt.Errorf(errMissingFingerprint)
  382. }
  383. if store.Auth.User == "" {
  384. return nil, fmt.Errorf(errMissingUser)
  385. }
  386. if store.Auth.Tenancy == "" {
  387. return nil, fmt.Errorf(errMissingTenancy)
  388. }
  389. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  390. }
  391. func (vms *VaultManagementService) Close(_ context.Context) error {
  392. return nil
  393. }
  394. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  395. _, err := vms.KmsVaultClient.GetVault(
  396. context.Background(), keymanagement.GetVaultRequest{
  397. VaultId: &vms.vault,
  398. },
  399. )
  400. if err != nil {
  401. failure, ok := common.IsServiceError(err)
  402. if ok {
  403. code := failure.GetCode()
  404. switch code {
  405. case "NotAuthenticated":
  406. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  407. case "NotAuthorizedOrNotFound":
  408. // User authentication was successful, but user might not have a permission like:
  409. //
  410. // Allow group external_secrets to read vaults in tenancy
  411. //
  412. // Which is fine, because to read secrets we only need:
  413. //
  414. // Allow group external_secrets to read secret-family in tenancy
  415. //
  416. // But we can't test for this permission without knowing the name of a secret
  417. return esv1beta1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  418. default:
  419. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  420. }
  421. } else {
  422. return esv1beta1.ValidationResultError, err
  423. }
  424. }
  425. return esv1beta1.ValidationResultReady, nil
  426. }
  427. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  428. storeSpec := store.GetSpec()
  429. oracleSpec := storeSpec.Provider.Oracle
  430. vault := oracleSpec.Vault
  431. if vault == "" {
  432. return nil, fmt.Errorf("vault cannot be empty")
  433. }
  434. region := oracleSpec.Region
  435. if region == "" {
  436. return nil, fmt.Errorf("region cannot be empty")
  437. }
  438. auth := oracleSpec.Auth
  439. if auth == nil {
  440. return nil, nil
  441. }
  442. user := oracleSpec.Auth.User
  443. if user == "" {
  444. return nil, fmt.Errorf("user cannot be empty")
  445. }
  446. tenant := oracleSpec.Auth.Tenancy
  447. if tenant == "" {
  448. return nil, fmt.Errorf("tenant cannot be empty")
  449. }
  450. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  451. if privateKey.Name == "" {
  452. return nil, fmt.Errorf("privateKey.name cannot be empty")
  453. }
  454. if privateKey.Key == "" {
  455. return nil, fmt.Errorf("privateKey.key cannot be empty")
  456. }
  457. err := utils.ValidateSecretSelector(store, privateKey)
  458. if err != nil {
  459. return nil, err
  460. }
  461. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  462. if fingerprint.Name == "" {
  463. return nil, fmt.Errorf("fingerprint.name cannot be empty")
  464. }
  465. if fingerprint.Key == "" {
  466. return nil, fmt.Errorf("fingerprint.key cannot be empty")
  467. }
  468. err = utils.ValidateSecretSelector(store, fingerprint)
  469. if err != nil {
  470. return nil, err
  471. }
  472. if oracleSpec.ServiceAccountRef != nil {
  473. if err := utils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  474. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  475. }
  476. }
  477. return nil, nil
  478. }
  479. func (vms *VaultManagementService) getWorkloadIdentityProvider(store esv1beta1.GenericStore, serviceAcccountRef *esmeta.ServiceAccountSelector, region, namespace string) (configurationProvider common.ConfigurationProvider, err error) {
  480. defer func() {
  481. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  482. err = errors.Join(err, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, uerr))
  483. }
  484. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  485. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  486. }
  487. vms.workloadIdentityMutex.Unlock()
  488. }()
  489. vms.workloadIdentityMutex.Lock()
  490. // OCI SDK requires specific environment variables for workload identity.
  491. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  492. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, err)
  493. }
  494. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  495. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, err)
  496. }
  497. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  498. if serviceAcccountRef == nil {
  499. return auth.OkeWorkloadIdentityConfigurationProvider()
  500. }
  501. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  502. if err = utils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  503. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  504. }
  505. cfg, err := ctrlcfg.GetConfig()
  506. if err != nil {
  507. return nil, err
  508. }
  509. clientset, err := kubernetes.NewForConfig(cfg)
  510. if err != nil {
  511. return nil, err
  512. }
  513. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  514. return auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  515. }
  516. func sanitizeOCISDKErr(err error) error {
  517. if err == nil {
  518. return nil
  519. }
  520. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  521. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  522. return fmt.Errorf("%s service failed to %s, HTTP status code %d: %s", serviceError.GetTargetService(), serviceError.GetOperationName(), serviceError.GetHTTPStatusCode(), serviceError.GetMessage())
  523. }
  524. return err
  525. }
  526. func init() {
  527. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  528. Oracle: &esv1beta1.OracleProvider{},
  529. })
  530. }