client.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package secretmanager
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "strconv"
  20. "strings"
  21. secretmanager "cloud.google.com/go/secretmanager/apiv1"
  22. "cloud.google.com/go/secretmanager/apiv1/secretmanagerpb"
  23. "github.com/googleapis/gax-go/v2"
  24. "github.com/googleapis/gax-go/v2/apierror"
  25. "github.com/tidwall/gjson"
  26. "google.golang.org/api/iterator"
  27. "google.golang.org/grpc/codes"
  28. ctrl "sigs.k8s.io/controller-runtime"
  29. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  30. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  31. "github.com/external-secrets/external-secrets/pkg/constants"
  32. "github.com/external-secrets/external-secrets/pkg/find"
  33. "github.com/external-secrets/external-secrets/pkg/metrics"
  34. "github.com/external-secrets/external-secrets/pkg/utils"
  35. )
  36. const (
  37. CloudPlatformRole = "https://www.googleapis.com/auth/cloud-platform"
  38. defaultVersion = "latest"
  39. errGCPSMStore = "received invalid GCPSM SecretStore resource"
  40. errUnableGetCredentials = "unable to get credentials: %w"
  41. errClientClose = "unable to close SecretManager client: %w"
  42. errMissingStoreSpec = "invalid: missing store spec"
  43. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  44. errMissingSAK = "missing SecretAccessKey"
  45. errUnableProcessJSONCredentials = "failed to process the provided JSON credentials: %w"
  46. errUnableCreateGCPSMClient = "failed to create GCP secretmanager client: %w"
  47. errUninitalizedGCPProvider = "provider GCP is not initialized"
  48. errClientGetSecretAccess = "unable to access Secret from SecretManager Client: %w"
  49. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  50. errInvalidStore = "invalid store"
  51. errInvalidStoreSpec = "invalid store spec"
  52. errInvalidStoreProv = "invalid store provider"
  53. errInvalidGCPProv = "invalid gcp secrets manager provider"
  54. errInvalidAuthSecretRef = "invalid auth secret ref: %w"
  55. errInvalidWISARef = "invalid workload identity service account reference: %w"
  56. errUnexpectedFindOperator = "unexpected find operator"
  57. )
  58. type Client struct {
  59. smClient GoogleSecretManagerClient
  60. kube kclient.Client
  61. store *esv1beta1.GCPSMProvider
  62. storeKind string
  63. // namespace of the external secret
  64. namespace string
  65. workloadIdentity *workloadIdentity
  66. }
  67. type GoogleSecretManagerClient interface {
  68. DeleteSecret(ctx context.Context, req *secretmanagerpb.DeleteSecretRequest, opts ...gax.CallOption) error
  69. AccessSecretVersion(ctx context.Context, req *secretmanagerpb.AccessSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.AccessSecretVersionResponse, error)
  70. ListSecrets(ctx context.Context, req *secretmanagerpb.ListSecretsRequest, opts ...gax.CallOption) *secretmanager.SecretIterator
  71. AddSecretVersion(ctx context.Context, req *secretmanagerpb.AddSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.SecretVersion, error)
  72. CreateSecret(ctx context.Context, req *secretmanagerpb.CreateSecretRequest, opts ...gax.CallOption) (*secretmanagerpb.Secret, error)
  73. Close() error
  74. GetSecret(ctx context.Context, req *secretmanagerpb.GetSecretRequest, opts ...gax.CallOption) (*secretmanagerpb.Secret, error)
  75. }
  76. var log = ctrl.Log.WithName("provider").WithName("gcp").WithName("secretsmanager")
  77. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  78. var gcpSecret *secretmanagerpb.Secret
  79. var err error
  80. gcpSecret, err = c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  81. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  82. })
  83. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMGetSecret, err)
  84. var gErr *apierror.APIError
  85. if errors.As(err, &gErr) {
  86. if gErr.GRPCStatus().Code() == codes.NotFound {
  87. return nil
  88. }
  89. return err
  90. }
  91. if err != nil {
  92. return err
  93. }
  94. manager, ok := gcpSecret.Labels["managed-by"]
  95. if !ok || manager != "external-secrets" {
  96. return nil
  97. }
  98. deleteSecretVersionReq := &secretmanagerpb.DeleteSecretRequest{
  99. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  100. }
  101. err = c.smClient.DeleteSecret(ctx, deleteSecretVersionReq)
  102. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMDeleteSecret, err)
  103. return err
  104. }
  105. func parseError(err error) error {
  106. var gerr *apierror.APIError
  107. if errors.As(err, &gerr) && gerr.GRPCStatus().Code() == codes.NotFound {
  108. return esv1beta1.NoSecretError{}
  109. }
  110. return err
  111. }
  112. // PushSecret pushes a kubernetes secret key into gcp provider Secret.
  113. func (c *Client) PushSecret(ctx context.Context, payload []byte, remoteRef esv1beta1.PushRemoteRef) error {
  114. createSecretReq := &secretmanagerpb.CreateSecretRequest{
  115. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  116. SecretId: remoteRef.GetRemoteKey(),
  117. Secret: &secretmanagerpb.Secret{
  118. Labels: map[string]string{
  119. "managed-by": "external-secrets",
  120. },
  121. Replication: &secretmanagerpb.Replication{
  122. Replication: &secretmanagerpb.Replication_Automatic_{
  123. Automatic: &secretmanagerpb.Replication_Automatic{},
  124. },
  125. },
  126. },
  127. }
  128. var gcpSecret *secretmanagerpb.Secret
  129. var err error
  130. gcpSecret, err = c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  131. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  132. })
  133. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMGetSecret, err)
  134. var gErr *apierror.APIError
  135. if err != nil && errors.As(err, &gErr) {
  136. if gErr.GRPCStatus().Code() == codes.NotFound {
  137. gcpSecret, err = c.smClient.CreateSecret(ctx, createSecretReq)
  138. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMCreateSecret, err)
  139. if err != nil {
  140. return err
  141. }
  142. } else {
  143. return err
  144. }
  145. }
  146. manager, ok := gcpSecret.Labels["managed-by"]
  147. if !ok || manager != "external-secrets" {
  148. return fmt.Errorf("secret %v is not managed by external secrets", remoteRef.GetRemoteKey())
  149. }
  150. gcpVersion, err := c.smClient.AccessSecretVersion(ctx, &secretmanagerpb.AccessSecretVersionRequest{
  151. Name: fmt.Sprintf("projects/%s/secrets/%s/versions/latest", c.store.ProjectID, remoteRef.GetRemoteKey()),
  152. })
  153. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAccessSecretVersion, err)
  154. if errors.As(err, &gErr) {
  155. if err != nil && gErr.GRPCStatus().Code() != codes.NotFound {
  156. return err
  157. }
  158. } else if err != nil {
  159. return err
  160. }
  161. if gcpVersion != nil && gcpVersion.Payload != nil && bytes.Equal(payload, gcpVersion.Payload.Data) {
  162. return nil
  163. }
  164. addSecretVersionReq := &secretmanagerpb.AddSecretVersionRequest{
  165. Parent: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  166. Payload: &secretmanagerpb.SecretPayload{
  167. Data: payload,
  168. },
  169. }
  170. _, err = c.smClient.AddSecretVersion(ctx, addSecretVersionReq)
  171. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAddSecretVersion, err)
  172. if err != nil {
  173. return err
  174. }
  175. return nil
  176. }
  177. // GetAllSecrets syncs multiple secrets from gcp provider into a single Kubernetes Secret.
  178. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  179. if ref.Name != nil {
  180. return c.findByName(ctx, ref)
  181. }
  182. if len(ref.Tags) > 0 {
  183. return c.findByTags(ctx, ref)
  184. }
  185. return nil, errors.New(errUnexpectedFindOperator)
  186. }
  187. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  188. // regex matcher
  189. matcher, err := find.New(*ref.Name)
  190. if err != nil {
  191. return nil, err
  192. }
  193. req := &secretmanagerpb.ListSecretsRequest{
  194. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  195. }
  196. if ref.Path != nil {
  197. req.Filter = fmt.Sprintf("name:%s", *ref.Path)
  198. }
  199. // Call the API.
  200. it := c.smClient.ListSecrets(ctx, req)
  201. secretMap := make(map[string][]byte)
  202. var resp *secretmanagerpb.Secret
  203. defer metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMListSecrets, err)
  204. for {
  205. resp, err = it.Next()
  206. if errors.Is(err, iterator.Done) {
  207. break
  208. }
  209. if err != nil {
  210. return nil, fmt.Errorf("failed to list secrets: %w", err)
  211. }
  212. log.V(1).Info("gcp sm findByName found", "secrets", strconv.Itoa(it.PageInfo().Remaining()))
  213. key := c.trimName(resp.Name)
  214. // If we don't match we skip.
  215. // Also, if we have path, and it is not at the beguining we skip.
  216. // We have to check if path is at the beguining of the key because
  217. // there is no way to create a `name:%s*` (starts with) filter
  218. // At https://cloud.google.com/secret-manager/docs/filtering you can use `*`
  219. // but not like that it seems.
  220. if !matcher.MatchName(key) || (ref.Path != nil && !strings.HasPrefix(key, *ref.Path)) {
  221. continue
  222. }
  223. log.V(1).Info("gcp sm findByName matches", "name", resp.Name)
  224. secretMap[key], err = c.getData(ctx, key)
  225. if err != nil {
  226. return nil, err
  227. }
  228. }
  229. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  230. }
  231. func (c *Client) getData(ctx context.Context, key string) ([]byte, error) {
  232. dataRef := esv1beta1.ExternalSecretDataRemoteRef{
  233. Key: key,
  234. }
  235. data, err := c.GetSecret(ctx, dataRef)
  236. if err != nil {
  237. return []byte(""), err
  238. }
  239. return data, nil
  240. }
  241. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  242. var tagFilter string
  243. for k, v := range ref.Tags {
  244. tagFilter = fmt.Sprintf("%slabels.%s=%s ", tagFilter, k, v)
  245. }
  246. tagFilter = strings.TrimSuffix(tagFilter, " ")
  247. if ref.Path != nil {
  248. tagFilter = fmt.Sprintf("%s name:%s", tagFilter, *ref.Path)
  249. }
  250. req := &secretmanagerpb.ListSecretsRequest{
  251. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  252. }
  253. log.V(1).Info("gcp sm findByTags", "tagFilter", tagFilter)
  254. req.Filter = tagFilter
  255. // Call the API.
  256. it := c.smClient.ListSecrets(ctx, req)
  257. var resp *secretmanagerpb.Secret
  258. var err error
  259. defer metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMListSecrets, err)
  260. secretMap := make(map[string][]byte)
  261. for {
  262. resp, err = it.Next()
  263. if errors.Is(err, iterator.Done) {
  264. break
  265. }
  266. if err != nil {
  267. return nil, fmt.Errorf("failed to list secrets: %w", err)
  268. }
  269. key := c.trimName(resp.Name)
  270. if ref.Path != nil && !strings.HasPrefix(key, *ref.Path) {
  271. continue
  272. }
  273. log.V(1).Info("gcp sm findByTags matches tags", "name", resp.Name)
  274. secretMap[key], err = c.getData(ctx, key)
  275. if err != nil {
  276. return nil, err
  277. }
  278. }
  279. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  280. }
  281. func (c *Client) trimName(name string) string {
  282. projectIDNumuber := c.extractProjectIDNumber(name)
  283. key := strings.TrimPrefix(name, fmt.Sprintf("projects/%s/secrets/", projectIDNumuber))
  284. return key
  285. }
  286. // extractProjectIDNumber grabs the project id from the full name returned by gcp api
  287. // gcp api seems to always return the number and not the project name
  288. // (and users would always use the name, while requests accept both).
  289. func (c *Client) extractProjectIDNumber(secretFullName string) string {
  290. s := strings.Split(secretFullName, "/")
  291. ProjectIDNumuber := s[1]
  292. return ProjectIDNumuber
  293. }
  294. // GetSecret returns a single secret from the provider.
  295. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  296. if utils.IsNil(c.smClient) || c.store.ProjectID == "" {
  297. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  298. }
  299. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  300. return c.getSecretMetadata(ctx, ref)
  301. }
  302. version := ref.Version
  303. if version == "" {
  304. version = defaultVersion
  305. }
  306. req := &secretmanagerpb.AccessSecretVersionRequest{
  307. Name: fmt.Sprintf("projects/%s/secrets/%s/versions/%s", c.store.ProjectID, ref.Key, version),
  308. }
  309. result, err := c.smClient.AccessSecretVersion(ctx, req)
  310. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAccessSecretVersion, err)
  311. err = parseError(err)
  312. if err != nil {
  313. return nil, fmt.Errorf(errClientGetSecretAccess, err)
  314. }
  315. if ref.Property == "" {
  316. if result.Payload.Data != nil {
  317. return result.Payload.Data, nil
  318. }
  319. return nil, fmt.Errorf("invalid secret received. no secret string for key: %s", ref.Key)
  320. }
  321. var payload string
  322. if result.Payload.Data != nil {
  323. payload = string(result.Payload.Data)
  324. }
  325. idx := strings.Index(ref.Property, ".")
  326. refProperty := ref.Property
  327. if idx > 0 {
  328. refProperty = strings.ReplaceAll(refProperty, ".", "\\.")
  329. val := gjson.Get(payload, refProperty)
  330. if val.Exists() {
  331. return []byte(val.String()), nil
  332. }
  333. }
  334. val := gjson.Get(payload, ref.Property)
  335. if !val.Exists() {
  336. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  337. }
  338. return []byte(val.String()), nil
  339. }
  340. func (c *Client) getSecretMetadata(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  341. secret, err := c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  342. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, ref.Key),
  343. })
  344. err = parseError(err)
  345. if err != nil {
  346. return nil, fmt.Errorf(errClientGetSecretAccess, err)
  347. }
  348. const (
  349. annotations = "annotations"
  350. labels = "labels"
  351. )
  352. extractMetadataKey := func(s string, p string) string {
  353. prefix := p + "."
  354. if !strings.HasPrefix(s, prefix) {
  355. return ""
  356. }
  357. return strings.TrimPrefix(s, prefix)
  358. }
  359. if annotation := extractMetadataKey(ref.Property, annotations); annotation != "" {
  360. v, ok := secret.GetAnnotations()[annotation]
  361. if !ok {
  362. return nil, fmt.Errorf("annotation with key %s does not exist in secret %s", annotation, ref.Key)
  363. }
  364. return []byte(v), nil
  365. }
  366. if label := extractMetadataKey(ref.Property, labels); label != "" {
  367. v, ok := secret.GetLabels()[label]
  368. if !ok {
  369. return nil, fmt.Errorf("label with key %s does not exist in secret %s", label, ref.Key)
  370. }
  371. return []byte(v), nil
  372. }
  373. if ref.Property == annotations {
  374. j, err := json.Marshal(secret.GetAnnotations())
  375. if err != nil {
  376. return nil, fmt.Errorf("faild marshaling annotations into json: %w", err)
  377. }
  378. return j, nil
  379. }
  380. if ref.Property == labels {
  381. j, err := json.Marshal(secret.GetLabels())
  382. if err != nil {
  383. return nil, fmt.Errorf("faild marshaling labels into json: %w", err)
  384. }
  385. return j, nil
  386. }
  387. if ref.Property != "" {
  388. return nil, fmt.Errorf("invalid property %s: metadata property should start with either %s or %s", ref.Property, annotations, labels)
  389. }
  390. j, err := json.Marshal(map[string]map[string]string{
  391. "annotations": secret.GetAnnotations(),
  392. "labels": secret.GetLabels(),
  393. })
  394. if err != nil {
  395. return nil, fmt.Errorf("faild marshaling metadata map into json: %w", err)
  396. }
  397. return j, nil
  398. }
  399. // GetSecretMap returns multiple k/v pairs from the provider.
  400. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  401. if c.smClient == nil || c.store.ProjectID == "" {
  402. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  403. }
  404. data, err := c.GetSecret(ctx, ref)
  405. if err != nil {
  406. return nil, err
  407. }
  408. kv := make(map[string]json.RawMessage)
  409. err = json.Unmarshal(data, &kv)
  410. if err != nil {
  411. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  412. }
  413. secretData := make(map[string][]byte)
  414. for k, v := range kv {
  415. var strVal string
  416. err = json.Unmarshal(v, &strVal)
  417. if err == nil {
  418. secretData[k] = []byte(strVal)
  419. } else {
  420. secretData[k] = v
  421. }
  422. }
  423. return secretData, nil
  424. }
  425. func (c *Client) Close(_ context.Context) error {
  426. var err error
  427. if c.smClient != nil {
  428. err = c.smClient.Close()
  429. }
  430. if c.workloadIdentity != nil {
  431. err = c.workloadIdentity.Close()
  432. }
  433. useMu.Unlock()
  434. if err != nil {
  435. return fmt.Errorf(errClientClose, err)
  436. }
  437. return nil
  438. }
  439. func (c *Client) Validate() (esv1beta1.ValidationResult, error) {
  440. if c.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(c.store) {
  441. return esv1beta1.ValidationResultUnknown, nil
  442. }
  443. return esv1beta1.ValidationResultReady, nil
  444. }