csm_client.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package adapter provides the adapter implementation for CloudRU Secret Manager.
  14. package adapter
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "sync"
  20. "time"
  21. iamAuthV1 "github.com/cloudru-tech/iam-sdk/api/auth/v1"
  22. smssdk "github.com/cloudru-tech/secret-manager-sdk"
  23. smsV1 "github.com/cloudru-tech/secret-manager-sdk/api/v1"
  24. smsV2 "github.com/cloudru-tech/secret-manager-sdk/api/v2"
  25. "google.golang.org/grpc/codes"
  26. "google.golang.org/grpc/metadata"
  27. "google.golang.org/grpc/status"
  28. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  29. )
  30. // CredentialsResolver returns the actual client credentials.
  31. type CredentialsResolver interface {
  32. Resolve(ctx context.Context) (*Credentials, error)
  33. }
  34. // APIClient - Cloudru Secret Manager Service Client.
  35. type APIClient struct {
  36. cr CredentialsResolver
  37. iamClient iamAuthV1.AuthServiceClient
  38. smsClient *smssdk.Client
  39. mu sync.Mutex
  40. accessToken string
  41. accessTokenExpiresAt time.Time
  42. }
  43. // ListSecretsRequest is a request to list secrets.
  44. type ListSecretsRequest struct {
  45. ProjectID string
  46. Labels map[string]string
  47. NameExact string
  48. NameRegex string
  49. }
  50. // Credentials holds the keyID and secret for the CSM client.
  51. type Credentials struct {
  52. KeyID string
  53. Secret string
  54. }
  55. // NewCredentials creates a new Credentials object.
  56. func NewCredentials(kid, secret string) (*Credentials, error) {
  57. if kid == "" || secret == "" {
  58. return nil, errors.New("keyID and secret must be provided")
  59. }
  60. return &Credentials{KeyID: kid, Secret: secret}, nil
  61. }
  62. // NewAPIClient creates a new grpc SecretManager client.
  63. func NewAPIClient(cr CredentialsResolver, iamClient iamAuthV1.AuthServiceClient, client *smssdk.Client) *APIClient {
  64. return &APIClient{
  65. cr: cr,
  66. iamClient: iamClient,
  67. smsClient: client,
  68. }
  69. }
  70. // ListSecrets retrieves a list of secrets from CloudRU Secret Manager.
  71. func (c *APIClient) ListSecrets(ctx context.Context, req *ListSecretsRequest) ([]*smsV2.Secret, error) {
  72. searchReq := &smsV2.SearchSecretRequest{
  73. ProjectId: req.ProjectID,
  74. Labels: req.Labels,
  75. Depth: -1,
  76. }
  77. switch {
  78. case req.NameExact != "":
  79. searchReq.Name = &smsV2.SearchSecretRequest_Exact{Exact: req.NameExact}
  80. case req.NameRegex != "":
  81. searchReq.Name = &smsV2.SearchSecretRequest_Regex{Regex: req.NameRegex}
  82. }
  83. var err error
  84. ctx, err = c.authCtx(ctx)
  85. if err != nil {
  86. return nil, fmt.Errorf("unauthorized: %w", err)
  87. }
  88. resp, err := c.smsClient.V2.SecretService.Search(ctx, searchReq)
  89. if err != nil {
  90. return nil, err
  91. }
  92. return resp.Secrets, nil
  93. }
  94. // AccessSecretVersionByPath retrieves a secret version by its path from CloudRU Secret Manager.
  95. func (c *APIClient) AccessSecretVersionByPath(ctx context.Context, projectID, path string, version *int32) ([]byte, error) {
  96. var err error
  97. ctx, err = c.authCtx(ctx)
  98. if err != nil {
  99. return nil, fmt.Errorf("unauthorized: %w", err)
  100. }
  101. req := &smsV2.AccessSecretRequest{
  102. ProjectId: projectID,
  103. Path: path,
  104. Version: version,
  105. }
  106. secret, err := c.smsClient.V2.SecretService.Access(ctx, req)
  107. if err != nil {
  108. st, _ := status.FromError(err)
  109. if st.Code() == codes.NotFound {
  110. return nil, esv1.NoSecretErr
  111. }
  112. return nil, fmt.Errorf("failed to get the secret by path '%s': %w", path, err)
  113. }
  114. return secret.GetPayload().GetValue(), nil
  115. }
  116. // AccessSecretVersion retrieves a specific version of a secret from CloudRU Secret Manager.
  117. func (c *APIClient) AccessSecretVersion(ctx context.Context, id, version string) ([]byte, error) {
  118. var err error
  119. ctx, err = c.authCtx(ctx)
  120. if err != nil {
  121. return nil, fmt.Errorf("unauthorized: %w", err)
  122. }
  123. if version == "" {
  124. version = "latest"
  125. }
  126. req := &smsV1.AccessSecretVersionRequest{
  127. SecretId: id,
  128. SecretVersionId: version,
  129. }
  130. secret, err := c.smsClient.SecretService.AccessSecretVersion(ctx, req)
  131. if err != nil {
  132. st, _ := status.FromError(err)
  133. if st.Code() == codes.NotFound {
  134. return nil, esv1.NoSecretErr
  135. }
  136. return nil, fmt.Errorf("failed to get the secret by id '%s v%s': %w", id, version, err)
  137. }
  138. return secret.GetData().GetValue(), nil
  139. }
  140. func (c *APIClient) authCtx(ctx context.Context) (context.Context, error) {
  141. md, ok := metadata.FromOutgoingContext(ctx)
  142. if !ok {
  143. md = metadata.New(map[string]string{})
  144. }
  145. token, err := c.getOrCreateToken(ctx)
  146. if err != nil {
  147. return ctx, fmt.Errorf("fetch IAM access token: %w", err)
  148. }
  149. md.Set("authorization", "Bearer "+token)
  150. return metadata.NewOutgoingContext(ctx, md), nil
  151. }
  152. func (c *APIClient) getOrCreateToken(ctx context.Context) (string, error) {
  153. c.mu.Lock()
  154. defer c.mu.Unlock()
  155. if c.accessToken != "" && c.accessTokenExpiresAt.After(time.Now()) {
  156. return c.accessToken, nil
  157. }
  158. creds, err := c.cr.Resolve(ctx)
  159. if err != nil {
  160. return "", fmt.Errorf("resolve API credentials: %w", err)
  161. }
  162. resp, err := c.iamClient.GetToken(ctx, &iamAuthV1.GetTokenRequest{KeyId: creds.KeyID, Secret: creds.Secret})
  163. if err != nil {
  164. return "", fmt.Errorf("get access token: %w", err)
  165. }
  166. c.accessToken = resp.AccessToken
  167. c.accessTokenExpiresAt = time.Now().Add(time.Second * time.Duration(resp.ExpiresIn))
  168. return c.accessToken, nil
  169. }