client.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package keepersecurity
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "regexp"
  19. "strings"
  20. ksm "github.com/keeper-security/secrets-manager-go/core"
  21. "golang.org/x/exp/maps"
  22. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. )
  25. const (
  26. errKeeperSecuritySecretsNotFound = "unable to find secrets. %w"
  27. errKeeperSecuritySecretNotFound = "unable to find secret %s. Error: %w"
  28. errKeeperSecuritySecretNotUnique = "more than 1 secret %s found"
  29. errKeeperSecurityNoSecretsFound = "no secrets found"
  30. errKeeperSecurityInvalidSecretInvalidFormat = "invalid secret. Invalid format: %w"
  31. errKeeperSecurityInvalidSecretDuplicatedKey = "invalid Secret. Following keys are duplicated %s"
  32. errKeeperSecurityInvalidProperty = "invalid Property. Secret %s does not have any key matching %s"
  33. errKeeperSecurityInvalidField = "invalid Field. Key %s does not exists"
  34. errKeeperSecurityNoFields = "invalid Secret. Secret %s does not contain any valid field/file"
  35. keeperSecurityFileRef = "fileRef"
  36. keeperSecurityMfa = "oneTimeCode"
  37. errTagsNotImplemented = "'find.tags' is not implemented in the KeeperSecurity provider"
  38. errPathNotImplemented = "'find.path' is not implemented in the KeeperSecurity provider"
  39. errInvalidJSONSecret = "invalid Secret. Secret %s can not be converted to JSON. %w"
  40. errInvalidRegex = "find.name.regex. Invalid Regular expresion %s. %w"
  41. errInvalidRemoteRefKey = "match.remoteRef.remoteKey. Invalid format. Format should match secretName/key got %s"
  42. errInvalidSecretType = "ESO can only push/delete %s record types. Secret %s is type %s"
  43. errFieldNotFound = "secret %s does not contain any custom field with label %s"
  44. externalSecretType = "externalSecrets"
  45. secretType = "secret"
  46. LoginType = "login"
  47. LoginTypeExpr = "login|username"
  48. PasswordType = "password"
  49. URLTypeExpr = "url|baseurl"
  50. URLType = "url"
  51. )
  52. type Client struct {
  53. ksmClient SecurityClient
  54. folderID string
  55. }
  56. type SecurityClient interface {
  57. GetSecrets(filter []string) ([]*ksm.Record, error)
  58. GetSecretByTitle(recordTitle string) (*ksm.Record, error)
  59. CreateSecretWithRecordData(recUID, folderUID string, recordData *ksm.RecordCreate) (string, error)
  60. DeleteSecrets(recrecordUids []string) (map[string]string, error)
  61. Save(record *ksm.Record) error
  62. }
  63. type Field struct {
  64. Type string `json:"type"`
  65. Value []string `json:"value"`
  66. }
  67. type CustomField struct {
  68. Type string `json:"type"`
  69. Label string `json:"label"`
  70. Value []string `json:"value"`
  71. }
  72. type File struct {
  73. Title string `json:"type"`
  74. Content string `json:"content"`
  75. }
  76. type Secret struct {
  77. Title string `json:"title"`
  78. Type string `json:"type"`
  79. Fields []Field `json:"fields"`
  80. Custom []CustomField `json:"custom"`
  81. Files []File `json:"files"`
  82. }
  83. func (c *Client) Validate() (esv1beta1.ValidationResult, error) {
  84. return esv1beta1.ValidationResultReady, nil
  85. }
  86. func (c *Client) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  87. record, err := c.findSecretByID(ref.Key)
  88. if err != nil {
  89. return nil, err
  90. }
  91. secret, err := c.getValidKeeperSecret(record)
  92. if err != nil {
  93. return nil, err
  94. }
  95. return secret.getItem(ref)
  96. }
  97. func (c *Client) GetSecretMap(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  98. record, err := c.findSecretByID(ref.Key)
  99. if err != nil {
  100. return nil, err
  101. }
  102. secret, err := c.getValidKeeperSecret(record)
  103. if err != nil {
  104. return nil, err
  105. }
  106. return secret.getItems(ref)
  107. }
  108. func (c *Client) GetAllSecrets(_ context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  109. if ref.Tags != nil {
  110. return nil, fmt.Errorf(errTagsNotImplemented)
  111. }
  112. if ref.Path != nil {
  113. return nil, fmt.Errorf(errPathNotImplemented)
  114. }
  115. secretData := make(map[string][]byte)
  116. records, err := c.findSecrets()
  117. if err != nil {
  118. return nil, err
  119. }
  120. for _, record := range records {
  121. secret, err := c.getValidKeeperSecret(record)
  122. if err != nil {
  123. return nil, err
  124. }
  125. match, err := regexp.MatchString(ref.Name.RegExp, secret.Title)
  126. if err != nil {
  127. return nil, fmt.Errorf(errInvalidRegex, ref.Name.RegExp, err)
  128. }
  129. if !match {
  130. continue
  131. }
  132. secretData[secret.Title], err = secret.getItem(esv1beta1.ExternalSecretDataRemoteRef{})
  133. if err != nil {
  134. return nil, err
  135. }
  136. }
  137. return secretData, nil
  138. }
  139. func (c *Client) Close(_ context.Context) error {
  140. return nil
  141. }
  142. func (c *Client) PushSecret(_ context.Context, value []byte, _ *apiextensionsv1.JSON, remoteRef esv1beta1.PushRemoteRef) error {
  143. parts, err := c.buildSecretNameAndKey(remoteRef)
  144. if err != nil {
  145. return err
  146. }
  147. secret, err := c.findSecretByName(parts[0])
  148. if err != nil {
  149. _, err = c.createSecret(parts[0], parts[1], value)
  150. if err != nil {
  151. return err
  152. }
  153. }
  154. if secret != nil {
  155. if secret.Type() != externalSecretType {
  156. return fmt.Errorf(errInvalidSecretType, externalSecretType, secret.Title(), secret.Type())
  157. }
  158. err = c.updateSecret(secret, parts[1], value)
  159. if err != nil {
  160. return err
  161. }
  162. }
  163. return nil
  164. }
  165. func (c *Client) DeleteSecret(_ context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  166. parts, err := c.buildSecretNameAndKey(remoteRef)
  167. if err != nil {
  168. return err
  169. }
  170. secret, err := c.findSecretByName(parts[0])
  171. if err != nil {
  172. return err
  173. }
  174. if secret.Type() != externalSecretType {
  175. return fmt.Errorf(errInvalidSecretType, externalSecretType, secret.Title(), secret.Type())
  176. }
  177. _, err = c.ksmClient.DeleteSecrets([]string{secret.Uid})
  178. if err != nil {
  179. return nil
  180. }
  181. return nil
  182. }
  183. func (c *Client) buildSecretNameAndKey(remoteRef esv1beta1.PushRemoteRef) ([]string, error) {
  184. parts := strings.Split(remoteRef.GetRemoteKey(), "/")
  185. if len(parts) != 2 {
  186. return nil, fmt.Errorf(errInvalidRemoteRefKey, remoteRef.GetRemoteKey())
  187. }
  188. return parts, nil
  189. }
  190. func (c *Client) createSecret(name, key string, value []byte) (string, error) {
  191. normalizedKey := strings.ToLower(key)
  192. externalSecretRecord := ksm.NewRecordCreate(externalSecretType, name)
  193. login := regexp.MustCompile(LoginTypeExpr)
  194. pass := regexp.MustCompile(PasswordType)
  195. url := regexp.MustCompile(URLTypeExpr)
  196. switch {
  197. case login.MatchString(normalizedKey):
  198. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  199. ksm.NewLogin(string(value)),
  200. )
  201. case pass.MatchString(normalizedKey):
  202. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  203. ksm.NewPassword(string(value)),
  204. )
  205. case url.MatchString(normalizedKey):
  206. externalSecretRecord.Fields = append(externalSecretRecord.Fields,
  207. ksm.NewUrl(string(value)),
  208. )
  209. default:
  210. field := ksm.KeeperRecordField{Type: secretType, Label: key}
  211. externalSecretRecord.Custom = append(externalSecretRecord.Custom,
  212. ksm.Secret{KeeperRecordField: field, Value: []string{string(value)}},
  213. )
  214. }
  215. return c.ksmClient.CreateSecretWithRecordData("", c.folderID, externalSecretRecord)
  216. }
  217. func (c *Client) updateSecret(secret *ksm.Record, key string, value []byte) error {
  218. normalizedKey := strings.ToLower(key)
  219. login := regexp.MustCompile(LoginTypeExpr)
  220. pass := regexp.MustCompile(PasswordType)
  221. url := regexp.MustCompile(URLTypeExpr)
  222. custom := false
  223. switch {
  224. case login.MatchString(normalizedKey):
  225. secret.SetFieldValueSingle(LoginType, string(value))
  226. case pass.MatchString(normalizedKey):
  227. secret.SetPassword(string(value))
  228. case url.MatchString(normalizedKey):
  229. secret.SetFieldValueSingle(URLType, string(value))
  230. default:
  231. custom = true
  232. }
  233. if custom {
  234. field := secret.GetCustomFieldValueByLabel(key)
  235. if field != "" {
  236. secret.SetCustomFieldValueSingle(key, string(value))
  237. } else {
  238. return fmt.Errorf(errFieldNotFound, secret.Title(), key)
  239. }
  240. }
  241. return c.ksmClient.Save(secret)
  242. }
  243. func (c *Client) getValidKeeperSecret(secret *ksm.Record) (*Secret, error) {
  244. keeperSecret := Secret{}
  245. err := json.Unmarshal([]byte(secret.RawJson), &keeperSecret)
  246. if err != nil {
  247. return nil, fmt.Errorf(errKeeperSecurityInvalidSecretInvalidFormat, err)
  248. }
  249. keeperSecret.addFiles(secret.Files)
  250. err = keeperSecret.validate()
  251. if err != nil {
  252. return nil, err
  253. }
  254. return &keeperSecret, nil
  255. }
  256. func (c *Client) findSecrets() ([]*ksm.Record, error) {
  257. records, err := c.ksmClient.GetSecrets([]string{})
  258. if err != nil {
  259. return nil, fmt.Errorf(errKeeperSecuritySecretsNotFound, err)
  260. }
  261. return records, nil
  262. }
  263. func (c *Client) findSecretByID(id string) (*ksm.Record, error) {
  264. records, err := c.ksmClient.GetSecrets([]string{id})
  265. if err != nil {
  266. return nil, fmt.Errorf(errKeeperSecuritySecretNotFound, id, err)
  267. }
  268. if len(records) == 0 {
  269. return nil, errors.New(errKeeperSecurityNoSecretsFound)
  270. }
  271. if len(records) > 1 {
  272. return nil, fmt.Errorf(errKeeperSecuritySecretNotUnique, id)
  273. }
  274. return records[0], nil
  275. }
  276. func (c *Client) findSecretByName(name string) (*ksm.Record, error) {
  277. record, err := c.ksmClient.GetSecretByTitle(name)
  278. if err != nil {
  279. return nil, err
  280. }
  281. return record, nil
  282. }
  283. func (s *Secret) validate() error {
  284. fields := make(map[string]int)
  285. for _, field := range s.Fields {
  286. fields[field.Type]++
  287. }
  288. for _, customField := range s.Custom {
  289. fields[customField.Label]++
  290. }
  291. for _, file := range s.Files {
  292. fields[file.Title]++
  293. }
  294. var duplicates []string
  295. for key, ocurrences := range fields {
  296. if ocurrences > 1 {
  297. duplicates = append(duplicates, key)
  298. }
  299. }
  300. if len(duplicates) != 0 {
  301. return fmt.Errorf(errKeeperSecurityInvalidSecretDuplicatedKey, strings.Join(duplicates, ", "))
  302. }
  303. return nil
  304. }
  305. func (s *Secret) addFiles(keeperFiles []*ksm.KeeperFile) {
  306. for _, f := range keeperFiles {
  307. s.Files = append(
  308. s.Files,
  309. File{
  310. Title: f.Title,
  311. Content: string(f.GetFileData()),
  312. },
  313. )
  314. }
  315. }
  316. func (s *Secret) getItem(ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  317. if ref.Property != "" {
  318. return s.getProperty(ref.Property)
  319. }
  320. secret, err := s.toString()
  321. return []byte(secret), err
  322. }
  323. func (s *Secret) getItems(ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  324. secretData := make(map[string][]byte)
  325. if ref.Property != "" {
  326. value, err := s.getProperty(ref.Property)
  327. if err != nil {
  328. return nil, err
  329. }
  330. secretData[ref.Property] = value
  331. return secretData, nil
  332. }
  333. fields := s.getFields()
  334. maps.Copy(secretData, fields)
  335. customFields := s.getCustomFields()
  336. maps.Copy(secretData, customFields)
  337. files := s.getFiles()
  338. maps.Copy(secretData, files)
  339. if len(secretData) == 0 {
  340. return nil, fmt.Errorf(errKeeperSecurityNoFields, s.Title)
  341. }
  342. return secretData, nil
  343. }
  344. func (s *Secret) getField(key string) ([]byte, error) {
  345. for _, field := range s.Fields {
  346. if field.Type == key && field.Type != keeperSecurityFileRef && field.Type != keeperSecurityMfa && len(field.Value) > 0 {
  347. return []byte(field.Value[0]), nil
  348. }
  349. }
  350. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  351. }
  352. func (s *Secret) getFields() map[string][]byte {
  353. secretData := make(map[string][]byte)
  354. for _, field := range s.Fields {
  355. if len(field.Value) > 0 {
  356. secretData[field.Type] = []byte(field.Value[0])
  357. }
  358. }
  359. return secretData
  360. }
  361. func (s *Secret) getCustomField(key string) ([]byte, error) {
  362. for _, field := range s.Custom {
  363. if field.Label == key && len(field.Value) > 0 {
  364. return []byte(field.Value[0]), nil
  365. }
  366. }
  367. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  368. }
  369. func (s *Secret) getCustomFields() map[string][]byte {
  370. secretData := make(map[string][]byte)
  371. for _, field := range s.Custom {
  372. if len(field.Value) > 0 {
  373. secretData[field.Label] = []byte(field.Value[0])
  374. }
  375. }
  376. return secretData
  377. }
  378. func (s *Secret) getFile(key string) ([]byte, error) {
  379. for _, file := range s.Files {
  380. if file.Title == key {
  381. return []byte(file.Content), nil
  382. }
  383. }
  384. return nil, fmt.Errorf(errKeeperSecurityInvalidField, key)
  385. }
  386. func (s *Secret) getProperty(key string) ([]byte, error) {
  387. field, _ := s.getField(key)
  388. if field != nil {
  389. return field, nil
  390. }
  391. customField, _ := s.getCustomField(key)
  392. if customField != nil {
  393. return customField, nil
  394. }
  395. file, _ := s.getFile(key)
  396. if file != nil {
  397. return file, nil
  398. }
  399. return nil, fmt.Errorf(errKeeperSecurityInvalidProperty, s.Title, key)
  400. }
  401. func (s *Secret) getFiles() map[string][]byte {
  402. secretData := make(map[string][]byte)
  403. for _, file := range s.Files {
  404. secretData[file.Title] = []byte(file.Content)
  405. }
  406. return secretData
  407. }
  408. func (s *Secret) toString() (string, error) {
  409. secretJSON, err := json.Marshal(s)
  410. if err != nil {
  411. return "", fmt.Errorf(errInvalidJSONSecret, s.Title, err)
  412. }
  413. return string(secretJSON), nil
  414. }