provider.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "context"
  15. "fmt"
  16. authv1 "k8s.io/api/authorization/v1"
  17. corev1 "k8s.io/api/core/v1"
  18. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  19. "k8s.io/client-go/kubernetes"
  20. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  21. "k8s.io/client-go/rest"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. )
  26. // https://github.com/external-secrets/external-secrets/issues/644
  27. var _ esv1beta1.SecretsClient = &Client{}
  28. var _ esv1beta1.Provider = &Provider{}
  29. type KClient interface {
  30. Get(ctx context.Context, name string, opts metav1.GetOptions) (*corev1.Secret, error)
  31. List(ctx context.Context, opts metav1.ListOptions) (*corev1.SecretList, error)
  32. }
  33. type RClient interface {
  34. Create(ctx context.Context, selfSubjectRulesReview *authv1.SelfSubjectRulesReview, opts metav1.CreateOptions) (*authv1.SelfSubjectRulesReview, error)
  35. }
  36. // Provider implements Secret Provider interface
  37. // for Kubernetes.
  38. type Provider struct{}
  39. // Client implements Secret Client interface
  40. // for Kubernetes.
  41. type Client struct {
  42. // ctrlClient is a controller-runtime client
  43. // with RBAC scope of the controller (privileged!)
  44. ctrlClient kclient.Client
  45. // ctrlClientset is a client-go CoreV1() client
  46. // with RBAC scope of the controller (privileged!)
  47. ctrlClientset typedcorev1.CoreV1Interface
  48. // userSecretClient is a client-go CoreV1().Secrets() client
  49. // with user-defined scope.
  50. userSecretClient KClient
  51. // userReviewClient is a SelfSubjectAccessReview client with
  52. // user-defined scope.
  53. userReviewClient RClient
  54. // store is the Kubernetes Provider spec
  55. // which contains the configuration for this provider.
  56. store *esv1beta1.KubernetesProvider
  57. storeKind string
  58. // namespace is the namespace of the
  59. // ExternalSecret referencing this provider.
  60. namespace string
  61. Certificate []byte
  62. Key []byte
  63. CA []byte
  64. BearerToken []byte
  65. }
  66. func init() {
  67. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  68. Kubernetes: &esv1beta1.KubernetesProvider{},
  69. })
  70. }
  71. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  72. return esv1beta1.SecretStoreReadOnly
  73. }
  74. // NewClient constructs a Kubernetes Provider.
  75. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  76. restCfg, err := ctrlcfg.GetConfig()
  77. if err != nil {
  78. return nil, err
  79. }
  80. clientset, err := kubernetes.NewForConfig(restCfg)
  81. if err != nil {
  82. return nil, err
  83. }
  84. return p.newClient(ctx, store, kube, clientset, namespace)
  85. }
  86. func (p *Provider) newClient(ctx context.Context, store esv1beta1.GenericStore, ctrlClient kclient.Client, ctrlClientset kubernetes.Interface, namespace string) (esv1beta1.SecretsClient, error) {
  87. storeSpec := store.GetSpec()
  88. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Kubernetes == nil {
  89. return nil, fmt.Errorf("no store type or wrong store type")
  90. }
  91. storeSpecKubernetes := storeSpec.Provider.Kubernetes
  92. client := &Client{
  93. ctrlClientset: ctrlClientset.CoreV1(),
  94. ctrlClient: ctrlClient,
  95. store: storeSpecKubernetes,
  96. namespace: namespace,
  97. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  98. }
  99. // allow SecretStore controller validation to pass
  100. // when using referent namespace.
  101. if client.storeKind == esv1beta1.ClusterSecretStoreKind && client.namespace == "" && isReferentSpec(storeSpecKubernetes) {
  102. return client, nil
  103. }
  104. if err := client.setAuth(ctx); err != nil {
  105. return nil, err
  106. }
  107. config := &rest.Config{
  108. Host: client.store.Server.URL,
  109. BearerToken: string(client.BearerToken),
  110. TLSClientConfig: rest.TLSClientConfig{
  111. Insecure: false,
  112. CertData: client.Certificate,
  113. KeyData: client.Key,
  114. CAData: client.CA,
  115. },
  116. }
  117. userClientset, err := kubernetes.NewForConfig(config)
  118. if err != nil {
  119. return nil, fmt.Errorf("error configuring clientset: %w", err)
  120. }
  121. client.userSecretClient = userClientset.CoreV1().Secrets(client.store.RemoteNamespace)
  122. client.userReviewClient = userClientset.AuthorizationV1().SelfSubjectRulesReviews()
  123. return client, nil
  124. }
  125. func isReferentSpec(prov *esv1beta1.KubernetesProvider) bool {
  126. if prov.Auth.Cert != nil {
  127. if prov.Auth.Cert.ClientCert.Namespace == nil {
  128. return true
  129. }
  130. if prov.Auth.Cert.ClientKey.Namespace == nil {
  131. return true
  132. }
  133. }
  134. if prov.Auth.ServiceAccount != nil {
  135. if prov.Auth.ServiceAccount.Namespace == nil {
  136. return true
  137. }
  138. }
  139. if prov.Auth.Token != nil {
  140. if prov.Auth.Token.BearerToken.Namespace == nil {
  141. return true
  142. }
  143. }
  144. return false
  145. }
  146. func (p *Provider) Close(_ context.Context) error {
  147. return nil
  148. }