provider.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package delinea
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "github.com/DelineaXPM/dsv-sdk-go/v2/vault"
  18. corev1 "k8s.io/api/core/v1"
  19. kubeClient "sigs.k8s.io/controller-runtime/pkg/client"
  20. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  21. "github.com/external-secrets/external-secrets/pkg/utils"
  22. )
  23. var (
  24. errEmptyTenant = errors.New("tenant must not be empty")
  25. errEmptyClientID = errors.New("clientID must be set")
  26. errEmptyClientSecret = errors.New("clientSecret must be set")
  27. errSecretRefAndValueConflict = errors.New("cannot specify both secret reference and value")
  28. errSecretRefAndValueMissing = errors.New("must specify either secret reference or direct value")
  29. errMissingStore = errors.New("missing store specification")
  30. errInvalidSpec = errors.New("invalid specification for delinea provider")
  31. errMissingSecretName = errors.New("must specify a secret name")
  32. errMissingSecretKey = errors.New("must specify a secret key")
  33. errClusterStoreRequiresNamespace = errors.New("when using a ClusterSecretStore, namespaces must be explicitly set")
  34. errNoSuchKeyFmt = "no such key in secret: %q"
  35. )
  36. type Provider struct{}
  37. var _ esv1beta1.Provider = &Provider{}
  38. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  39. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  40. return esv1beta1.SecretStoreReadOnly
  41. }
  42. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kubeClient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  43. cfg, err := getConfig(store)
  44. if err != nil {
  45. return nil, err
  46. }
  47. if store.GetKind() == esv1beta1.ClusterSecretStoreKind && doesConfigDependOnNamespace(cfg) {
  48. // we are not attached to a specific namespace, but some config values are dependent on it
  49. return nil, errClusterStoreRequiresNamespace
  50. }
  51. clientID, err := loadConfigSecret(ctx, cfg.ClientID, kube, namespace)
  52. if err != nil {
  53. return nil, err
  54. }
  55. clientSecret, err := loadConfigSecret(ctx, cfg.ClientSecret, kube, namespace)
  56. if err != nil {
  57. return nil, err
  58. }
  59. dsvClient, err := vault.New(vault.Configuration{
  60. Credentials: vault.ClientCredential{
  61. ClientID: clientID,
  62. ClientSecret: clientSecret,
  63. },
  64. Tenant: cfg.Tenant,
  65. TLD: cfg.TLD,
  66. URLTemplate: cfg.URLTemplate,
  67. })
  68. if err != nil {
  69. return nil, err
  70. }
  71. return &client{
  72. api: dsvClient,
  73. }, nil
  74. }
  75. func loadConfigSecret(ctx context.Context, ref *esv1beta1.DelineaProviderSecretRef, kube kubeClient.Client, defaultNamespace string) (string, error) {
  76. if ref.SecretRef == nil {
  77. return ref.Value, nil
  78. }
  79. if err := validateSecretRef(ref); err != nil {
  80. return "", err
  81. }
  82. namespace := defaultNamespace
  83. if ref.SecretRef.Namespace != nil {
  84. namespace = *ref.SecretRef.Namespace
  85. }
  86. objKey := kubeClient.ObjectKey{Namespace: namespace, Name: ref.SecretRef.Name}
  87. secret := corev1.Secret{}
  88. err := kube.Get(ctx, objKey, &secret)
  89. if err != nil {
  90. return "", err
  91. }
  92. value, ok := secret.Data[ref.SecretRef.Key]
  93. if !ok {
  94. return "", fmt.Errorf(errNoSuchKeyFmt, ref.SecretRef.Key)
  95. }
  96. return string(value), nil
  97. }
  98. func validateStoreSecretRef(store esv1beta1.GenericStore, ref *esv1beta1.DelineaProviderSecretRef) error {
  99. if ref.SecretRef != nil {
  100. if err := utils.ValidateReferentSecretSelector(store, *ref.SecretRef); err != nil {
  101. return err
  102. }
  103. }
  104. return validateSecretRef(ref)
  105. }
  106. func validateSecretRef(ref *esv1beta1.DelineaProviderSecretRef) error {
  107. if ref.SecretRef != nil {
  108. if ref.Value != "" {
  109. return errSecretRefAndValueConflict
  110. }
  111. if ref.SecretRef.Name == "" {
  112. return errMissingSecretName
  113. }
  114. if ref.SecretRef.Key == "" {
  115. return errMissingSecretKey
  116. }
  117. } else if ref.Value == "" {
  118. return errSecretRefAndValueMissing
  119. }
  120. return nil
  121. }
  122. func doesConfigDependOnNamespace(cfg *esv1beta1.DelineaProvider) bool {
  123. if cfg.ClientID.SecretRef != nil && cfg.ClientID.SecretRef.Namespace == nil {
  124. return true
  125. }
  126. if cfg.ClientSecret.SecretRef != nil && cfg.ClientSecret.SecretRef.Namespace == nil {
  127. return true
  128. }
  129. return false
  130. }
  131. func getConfig(store esv1beta1.GenericStore) (*esv1beta1.DelineaProvider, error) {
  132. if store == nil {
  133. return nil, errMissingStore
  134. }
  135. storeSpec := store.GetSpec()
  136. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Delinea == nil {
  137. return nil, errInvalidSpec
  138. }
  139. cfg := storeSpec.Provider.Delinea
  140. if cfg.Tenant == "" {
  141. return nil, errEmptyTenant
  142. }
  143. if cfg.ClientID == nil {
  144. return nil, errEmptyClientID
  145. }
  146. if cfg.ClientSecret == nil {
  147. return nil, errEmptyClientSecret
  148. }
  149. err := validateStoreSecretRef(store, cfg.ClientID)
  150. if err != nil {
  151. return nil, err
  152. }
  153. err = validateStoreSecretRef(store, cfg.ClientSecret)
  154. if err != nil {
  155. return nil, err
  156. }
  157. return cfg, nil
  158. }
  159. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  160. _, err := getConfig(store)
  161. return err
  162. }
  163. func init() {
  164. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  165. Delinea: &esv1beta1.DelineaProvider{},
  166. })
  167. }