oracle.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "os"
  21. "regexp"
  22. "sync"
  23. "time"
  24. "github.com/oracle/oci-go-sdk/v65/common"
  25. "github.com/oracle/oci-go-sdk/v65/common/auth"
  26. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  27. "github.com/oracle/oci-go-sdk/v65/secrets"
  28. "github.com/oracle/oci-go-sdk/v65/vault"
  29. "github.com/tidwall/gjson"
  30. corev1 "k8s.io/api/core/v1"
  31. "k8s.io/client-go/kubernetes"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  34. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  35. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  36. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  37. "github.com/external-secrets/external-secrets/pkg/utils"
  38. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  39. )
  40. const (
  41. errOracleClient = "cannot setup new oracle client: %w"
  42. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  43. errUninitalizedOracleProvider = "provider oracle is not initialized"
  44. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  45. errMissingPK = "missing PrivateKey"
  46. errMissingUser = "missing User ID"
  47. errMissingTenancy = "missing Tenancy ID"
  48. errMissingRegion = "missing Region"
  49. errMissingFingerprint = "missing Fingerprint"
  50. errMissingVault = "missing Vault"
  51. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  52. errMissingKey = "missing Key in secret: %s"
  53. errUnexpectedContent = "unexpected secret bundle content"
  54. )
  55. // https://github.com/external-secrets/external-secrets/issues/644
  56. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  57. var _ esv1beta1.Provider = &VaultManagementService{}
  58. type VaultManagementService struct {
  59. Client VMInterface
  60. KmsVaultClient KmsVCInterface
  61. VaultClient VaultInterface
  62. vault string
  63. compartment string
  64. encryptionKey string
  65. workloadIdentityMutex sync.Mutex
  66. }
  67. type VMInterface interface {
  68. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  69. }
  70. type KmsVCInterface interface {
  71. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  72. }
  73. type VaultInterface interface {
  74. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  75. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  76. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  77. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  78. }
  79. const (
  80. SecretNotFound = iota
  81. SecretExists
  82. SecretAPIError
  83. )
  84. func (vms *VaultManagementService) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  85. if vms.encryptionKey == "" {
  86. return errors.New("SecretStore must reference encryption key")
  87. }
  88. value := secret.Data[data.GetSecretKey()]
  89. if data.GetSecretKey() == "" {
  90. secretData := map[string]string{}
  91. for k, v := range secret.Data {
  92. secretData[k] = string(v)
  93. }
  94. jsonSecret, err := json.Marshal(secretData)
  95. if err != nil {
  96. return fmt.Errorf("unable to create json %v from value: %v", value, secretData)
  97. }
  98. value = jsonSecret
  99. }
  100. secretName := data.GetRemoteKey()
  101. encodedValue := base64.StdEncoding.EncodeToString(value)
  102. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  103. switch action {
  104. case SecretNotFound:
  105. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  106. CreateSecretDetails: vault.CreateSecretDetails{
  107. CompartmentId: &vms.compartment,
  108. KeyId: &vms.encryptionKey,
  109. SecretContent: vault.Base64SecretContentDetails{
  110. Content: &encodedValue,
  111. },
  112. SecretName: &secretName,
  113. VaultId: &vms.vault,
  114. },
  115. })
  116. return sanitizeOCISDKErr(err)
  117. case SecretExists:
  118. payload, err := decodeBundle(sec)
  119. if err != nil {
  120. return err
  121. }
  122. if bytes.Equal(payload, value) {
  123. return nil
  124. }
  125. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  126. SecretId: sec.SecretId,
  127. UpdateSecretDetails: vault.UpdateSecretDetails{
  128. SecretContent: vault.Base64SecretContentDetails{
  129. Content: &encodedValue,
  130. },
  131. },
  132. })
  133. return sanitizeOCISDKErr(err)
  134. default:
  135. return sanitizeOCISDKErr(err)
  136. }
  137. }
  138. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  139. secretName := remoteRef.GetRemoteKey()
  140. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  141. switch action {
  142. case SecretNotFound:
  143. return nil
  144. case SecretExists:
  145. if resp.TimeOfDeletion != nil {
  146. return nil
  147. }
  148. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  149. SecretId: resp.SecretId,
  150. })
  151. return sanitizeOCISDKErr(err)
  152. default:
  153. return sanitizeOCISDKErr(err)
  154. }
  155. }
  156. func (vms *VaultManagementService) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  157. return false, errors.New("not implemented")
  158. }
  159. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  160. var page *string
  161. var summaries []vault.SecretSummary
  162. for {
  163. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  164. CompartmentId: &vms.compartment,
  165. Page: page,
  166. VaultId: &vms.vault,
  167. })
  168. if err != nil {
  169. return nil, sanitizeOCISDKErr(err)
  170. }
  171. summaries = append(summaries, resp.Items...)
  172. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  173. break
  174. }
  175. }
  176. return vms.filteredSummaryResult(ctx, summaries, ref)
  177. }
  178. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  179. if utils.IsNil(vms.Client) {
  180. return nil, errors.New(errUninitalizedOracleProvider)
  181. }
  182. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  183. VaultId: &vms.vault,
  184. SecretName: &ref.Key,
  185. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  186. })
  187. if err != nil {
  188. return nil, sanitizeOCISDKErr(err)
  189. }
  190. payload, err := decodeBundle(sec)
  191. if err != nil {
  192. return nil, err
  193. }
  194. if ref.Property == "" {
  195. return payload, nil
  196. }
  197. val := gjson.Get(string(payload), ref.Property)
  198. if !val.Exists() {
  199. return nil, fmt.Errorf(errMissingKey, ref.Key)
  200. }
  201. return []byte(val.String()), nil
  202. }
  203. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  204. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  205. if !ok {
  206. return nil, errors.New(errUnexpectedContent)
  207. }
  208. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  209. if err != nil {
  210. return nil, err
  211. }
  212. return payload, nil
  213. }
  214. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  215. data, err := vms.GetSecret(ctx, ref)
  216. if err != nil {
  217. return nil, sanitizeOCISDKErr(err)
  218. }
  219. kv := make(map[string]string)
  220. err = json.Unmarshal(data, &kv)
  221. if err != nil {
  222. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  223. }
  224. secretData := make(map[string][]byte)
  225. for k, v := range kv {
  226. secretData[k] = []byte(v)
  227. }
  228. return secretData, nil
  229. }
  230. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  231. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  232. return esv1beta1.SecretStoreReadOnly
  233. }
  234. // NewClient constructs a new secrets client based on the provided store.
  235. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  236. storeSpec := store.GetSpec()
  237. oracleSpec := storeSpec.Provider.Oracle
  238. if oracleSpec.Vault == "" {
  239. return nil, errors.New(errMissingVault)
  240. }
  241. if oracleSpec.Region == "" {
  242. return nil, errors.New(errMissingRegion)
  243. }
  244. var (
  245. err error
  246. configurationProvider common.ConfigurationProvider
  247. )
  248. if oracleSpec.PrincipalType == esv1beta1.WorkloadPrincipal {
  249. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  250. } else if oracleSpec.PrincipalType == esv1beta1.InstancePrincipal || oracleSpec.Auth == nil {
  251. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  252. } else {
  253. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  254. }
  255. if err != nil {
  256. return nil, fmt.Errorf(errOracleClient, err)
  257. }
  258. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  259. if err != nil {
  260. return nil, fmt.Errorf(errOracleClient, err)
  261. }
  262. secretManagementService.SetRegion(oracleSpec.Region)
  263. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  264. if err != nil {
  265. return nil, fmt.Errorf(errOracleClient, err)
  266. }
  267. kmsVaultClient.SetRegion(oracleSpec.Region)
  268. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  269. if err != nil {
  270. return nil, fmt.Errorf(errOracleClient, err)
  271. }
  272. vaultClient.SetRegion(oracleSpec.Region)
  273. if storeSpec.RetrySettings != nil {
  274. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  275. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  276. attempts := safeConvert(*mr)
  277. opts = append(opts, common.WithMaximumNumberAttempts(attempts))
  278. }
  279. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  280. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  281. if err != nil {
  282. return nil, fmt.Errorf(errOracleClient, err)
  283. }
  284. opts = append(opts, common.WithFixedBackoff(i))
  285. }
  286. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  287. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  288. RetryPolicy: &customRetryPolicy,
  289. })
  290. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  291. RetryPolicy: &customRetryPolicy,
  292. })
  293. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  294. RetryPolicy: &customRetryPolicy,
  295. })
  296. }
  297. return &VaultManagementService{
  298. Client: secretManagementService,
  299. KmsVaultClient: kmsVaultClient,
  300. VaultClient: vaultClient,
  301. vault: oracleSpec.Vault,
  302. compartment: oracleSpec.Compartment,
  303. encryptionKey: oracleSpec.EncryptionKey,
  304. }, nil
  305. }
  306. func safeConvert(i int32) uint {
  307. if i < 0 {
  308. return 0
  309. }
  310. return uint(i)
  311. }
  312. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  313. // Try to look up the secret, which will determine if we should create or update the secret.
  314. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  315. SecretName: &secretName,
  316. VaultId: &vms.vault,
  317. })
  318. // Get a PushSecret action depending on the ListSecrets response.
  319. action := getSecretBundleCode(err)
  320. return resp, action, err
  321. }
  322. func getSecretBundleCode(err error) int {
  323. if err != nil {
  324. // If we got a 404 service error, try to create the secret.
  325. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  326. return SecretNotFound
  327. }
  328. return SecretAPIError
  329. }
  330. // Otherwise, update the existing secret.
  331. return SecretExists
  332. }
  333. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  334. secretMap := map[string][]byte{}
  335. for _, summary := range secretSummaries {
  336. matches, err := matchesRef(summary, ref)
  337. if err != nil {
  338. return nil, err
  339. }
  340. if !matches || summary.TimeOfDeletion != nil {
  341. continue
  342. }
  343. secret, err := vms.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{
  344. Key: *summary.SecretName,
  345. })
  346. if err != nil {
  347. return nil, err
  348. }
  349. secretMap[*summary.SecretName] = secret
  350. }
  351. return secretMap, nil
  352. }
  353. func matchesRef(secretSummary vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (bool, error) {
  354. if ref.Name != nil {
  355. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  356. if err != nil {
  357. return false, err
  358. }
  359. return matchString, nil
  360. }
  361. for k, v := range ref.Tags {
  362. if val, ok := secretSummary.FreeformTags[k]; ok {
  363. if val == v {
  364. return true, nil
  365. }
  366. }
  367. }
  368. return false, nil
  369. }
  370. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  371. if secretRef.Name == "" {
  372. return "", errors.New(errORACLECredSecretName)
  373. }
  374. secret, err := resolvers.SecretKeyRef(
  375. ctx,
  376. kube,
  377. storeKind,
  378. namespace,
  379. &secretRef,
  380. )
  381. if err != nil {
  382. return "", fmt.Errorf(errFetchSAKSecret, err)
  383. }
  384. return secret, nil
  385. }
  386. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  387. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  388. if err != nil {
  389. return nil, err
  390. }
  391. if privateKey == "" {
  392. return nil, errors.New(errMissingPK)
  393. }
  394. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  395. if err != nil {
  396. return nil, err
  397. }
  398. if fingerprint == "" {
  399. return nil, errors.New(errMissingFingerprint)
  400. }
  401. if store.Auth.User == "" {
  402. return nil, errors.New(errMissingUser)
  403. }
  404. if store.Auth.Tenancy == "" {
  405. return nil, errors.New(errMissingTenancy)
  406. }
  407. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  408. }
  409. func (vms *VaultManagementService) Close(_ context.Context) error {
  410. return nil
  411. }
  412. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  413. _, err := vms.KmsVaultClient.GetVault(
  414. context.Background(), keymanagement.GetVaultRequest{
  415. VaultId: &vms.vault,
  416. },
  417. )
  418. if err != nil {
  419. failure, ok := common.IsServiceError(err)
  420. if ok {
  421. code := failure.GetCode()
  422. switch code {
  423. case "NotAuthenticated":
  424. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  425. case "NotAuthorizedOrNotFound":
  426. // User authentication was successful, but user might not have a permission like:
  427. //
  428. // Allow group external_secrets to read vaults in tenancy
  429. //
  430. // Which is fine, because to read secrets we only need:
  431. //
  432. // Allow group external_secrets to read secret-family in tenancy
  433. //
  434. // But we can't test for this permission without knowing the name of a secret
  435. return esv1beta1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  436. default:
  437. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  438. }
  439. } else {
  440. return esv1beta1.ValidationResultError, err
  441. }
  442. }
  443. return esv1beta1.ValidationResultReady, nil
  444. }
  445. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  446. storeSpec := store.GetSpec()
  447. oracleSpec := storeSpec.Provider.Oracle
  448. vault := oracleSpec.Vault
  449. if vault == "" {
  450. return nil, errors.New("vault cannot be empty")
  451. }
  452. region := oracleSpec.Region
  453. if region == "" {
  454. return nil, errors.New("region cannot be empty")
  455. }
  456. auth := oracleSpec.Auth
  457. if auth == nil {
  458. return nil, nil
  459. }
  460. user := oracleSpec.Auth.User
  461. if user == "" {
  462. return nil, errors.New("user cannot be empty")
  463. }
  464. tenant := oracleSpec.Auth.Tenancy
  465. if tenant == "" {
  466. return nil, errors.New("tenant cannot be empty")
  467. }
  468. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  469. if privateKey.Name == "" {
  470. return nil, errors.New("privateKey.name cannot be empty")
  471. }
  472. if privateKey.Key == "" {
  473. return nil, errors.New("privateKey.key cannot be empty")
  474. }
  475. err := utils.ValidateSecretSelector(store, privateKey)
  476. if err != nil {
  477. return nil, err
  478. }
  479. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  480. if fingerprint.Name == "" {
  481. return nil, errors.New("fingerprint.name cannot be empty")
  482. }
  483. if fingerprint.Key == "" {
  484. return nil, errors.New("fingerprint.key cannot be empty")
  485. }
  486. err = utils.ValidateSecretSelector(store, fingerprint)
  487. if err != nil {
  488. return nil, err
  489. }
  490. if oracleSpec.ServiceAccountRef != nil {
  491. if err := utils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  492. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  493. }
  494. }
  495. return nil, nil
  496. }
  497. func (vms *VaultManagementService) getWorkloadIdentityProvider(store esv1beta1.GenericStore, serviceAcccountRef *esmeta.ServiceAccountSelector, region, namespace string) (configurationProvider common.ConfigurationProvider, err error) {
  498. defer func() {
  499. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  500. err = errors.Join(err, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, uerr))
  501. }
  502. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  503. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  504. }
  505. vms.workloadIdentityMutex.Unlock()
  506. }()
  507. vms.workloadIdentityMutex.Lock()
  508. // OCI SDK requires specific environment variables for workload identity.
  509. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  510. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, err)
  511. }
  512. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  513. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, err)
  514. }
  515. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  516. if serviceAcccountRef == nil {
  517. return auth.OkeWorkloadIdentityConfigurationProvider()
  518. }
  519. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  520. if err = utils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  521. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  522. }
  523. cfg, err := ctrlcfg.GetConfig()
  524. if err != nil {
  525. return nil, err
  526. }
  527. clientset, err := kubernetes.NewForConfig(cfg)
  528. if err != nil {
  529. return nil, err
  530. }
  531. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  532. return auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  533. }
  534. func sanitizeOCISDKErr(err error) error {
  535. if err == nil {
  536. return nil
  537. }
  538. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  539. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  540. return fmt.Errorf("%s service failed to %s, HTTP status code %d: %s", serviceError.GetTargetService(), serviceError.GetOperationName(), serviceError.GetHTTPStatusCode(), serviceError.GetMessage())
  541. }
  542. return err
  543. }
  544. func init() {
  545. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  546. Oracle: &esv1beta1.OracleProvider{},
  547. })
  548. }