provider.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. // Package conjur provides a Conjur provider for External Secrets.
  2. /*
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package conjur
  14. import (
  15. "context"
  16. "encoding/json"
  17. "fmt"
  18. "strings"
  19. "github.com/cyberark/conjur-api-go/conjurapi"
  20. "github.com/cyberark/conjur-api-go/conjurapi/authn"
  21. corev1 "k8s.io/api/core/v1"
  22. "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  24. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  25. "github.com/external-secrets/external-secrets/pkg/provider/conjur/util"
  26. "github.com/external-secrets/external-secrets/pkg/utils"
  27. )
  28. var (
  29. errConjurClient = "cannot setup new Conjur client: %w"
  30. errBadCertBundle = "caBundle failed to base64 decode: %w"
  31. errBadServiceUser = "could not get Auth.Apikey.UserRef: %w"
  32. errBadServiceAPIKey = "could not get Auth.Apikey.ApiKeyRef: %w"
  33. )
  34. // Provider is a provider for Conjur.
  35. type Provider struct {
  36. ConjurClient Client
  37. StoreKind string
  38. kube client.Client
  39. namespace string
  40. }
  41. // Client is an interface for the Conjur client.
  42. type Client interface {
  43. RetrieveSecret(secret string) (result []byte, err error)
  44. }
  45. // NewClient creates a new Conjur client.
  46. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  47. prov, err := util.GetConjurProvider(store)
  48. if err != nil {
  49. return nil, err
  50. }
  51. p.StoreKind = store.GetObjectKind().GroupVersionKind().Kind
  52. p.kube = kube
  53. p.namespace = namespace
  54. certBytes, decodeErr := utils.Decode(esv1beta1.ExternalSecretDecodeBase64, []byte(prov.CABundle))
  55. if decodeErr != nil {
  56. return nil, fmt.Errorf(errBadCertBundle, decodeErr)
  57. }
  58. cert := string(certBytes)
  59. config := conjurapi.Config{
  60. Account: prov.Auth.Apikey.Account,
  61. ApplianceURL: prov.URL,
  62. SSLCert: cert,
  63. }
  64. conjUser, secErr := p.secretKeyRef(ctx, prov.Auth.Apikey.UserRef)
  65. if secErr != nil {
  66. return nil, fmt.Errorf(errBadServiceUser, secErr)
  67. }
  68. conjAPIKey, secErr := p.secretKeyRef(ctx, prov.Auth.Apikey.APIKeyRef)
  69. if secErr != nil {
  70. return nil, fmt.Errorf(errBadServiceAPIKey, secErr)
  71. }
  72. conjur, err := conjurapi.NewClientFromKey(config,
  73. authn.LoginPair{
  74. Login: conjUser,
  75. APIKey: conjAPIKey,
  76. },
  77. )
  78. if err != nil {
  79. return nil, fmt.Errorf(errConjurClient, err)
  80. }
  81. p.ConjurClient = conjur
  82. return p, nil
  83. }
  84. // GetAllSecrets returns all secrets from the provider.
  85. // NOT IMPLEMENTED.
  86. func (p *Provider) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  87. // TO be implemented
  88. return nil, fmt.Errorf("GetAllSecrets not implemented")
  89. }
  90. // GetSecret returns a single secret from the provider.
  91. func (p *Provider) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  92. secretValue, err := p.ConjurClient.RetrieveSecret(ref.Key)
  93. if err != nil {
  94. return nil, err
  95. }
  96. return secretValue, nil
  97. }
  98. // PushSecret will write a single secret into the provider.
  99. func (p *Provider) PushSecret(_ context.Context, _ []byte, _ esv1beta1.PushRemoteRef) error {
  100. // NOT IMPLEMENTED
  101. return nil
  102. }
  103. func (p *Provider) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
  104. // NOT IMPLEMENTED
  105. return nil
  106. }
  107. // GetSecretMap returns multiple k/v pairs from the provider.
  108. func (p *Provider) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  109. // Gets a secret as normal, expecting secret value to be a json object
  110. data, err := p.GetSecret(ctx, ref)
  111. if err != nil {
  112. return nil, fmt.Errorf("error getting secret %s: %w", ref.Key, err)
  113. }
  114. // Maps the json data to a string:string map
  115. kv := make(map[string]string)
  116. err = json.Unmarshal(data, &kv)
  117. if err != nil {
  118. return nil, fmt.Errorf("unable to unmarshal secret %s: %w", ref.Key, err)
  119. }
  120. // Converts values in K:V pairs into bytes, while leaving keys as strings
  121. secretData := make(map[string][]byte)
  122. for k, v := range kv {
  123. secretData[k] = []byte(v)
  124. }
  125. return secretData, nil
  126. }
  127. // Close closes the provider.
  128. func (p *Provider) Close(_ context.Context) error {
  129. return nil
  130. }
  131. // Validate validates the provider.
  132. func (p *Provider) Validate() (esv1beta1.ValidationResult, error) {
  133. return esv1beta1.ValidationResultReady, nil
  134. }
  135. // ValidateStore validates the store.
  136. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  137. prov, err := util.GetConjurProvider(store)
  138. if err != nil {
  139. return err
  140. }
  141. if prov.URL == "" {
  142. return fmt.Errorf("conjur URL cannot be empty")
  143. }
  144. if prov.Auth.Apikey != nil {
  145. if prov.Auth.Apikey.Account == "" {
  146. return fmt.Errorf("missing Auth.ApiKey.Account")
  147. }
  148. if prov.Auth.Apikey.UserRef == nil {
  149. return fmt.Errorf("missing Auth.Apikey.UserRef")
  150. }
  151. if prov.Auth.Apikey.APIKeyRef == nil {
  152. return fmt.Errorf("missing Auth.Apikey.ApiKeyRef")
  153. }
  154. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.Apikey.UserRef); err != nil {
  155. return fmt.Errorf("invalid Auth.Apikey.UserRef: %w", err)
  156. }
  157. if err := utils.ValidateReferentSecretSelector(store, *prov.Auth.Apikey.APIKeyRef); err != nil {
  158. return fmt.Errorf("invalid Auth.Apikey.ApiKeyRef: %w", err)
  159. }
  160. }
  161. // At least one auth must be configured
  162. if prov.Auth.Apikey == nil {
  163. return fmt.Errorf("missing Auth.* configuration")
  164. }
  165. return nil
  166. }
  167. // Capabilities returns the provider Capabilities (Read, Write, ReadWrite).
  168. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  169. return esv1beta1.SecretStoreReadOnly
  170. }
  171. func (p *Provider) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  172. secret := &corev1.Secret{}
  173. ref := client.ObjectKey{
  174. Namespace: p.namespace,
  175. Name: secretRef.Name,
  176. }
  177. if (p.StoreKind == esv1beta1.ClusterSecretStoreKind) &&
  178. (secretRef.Namespace != nil) {
  179. ref.Namespace = *secretRef.Namespace
  180. }
  181. err := p.kube.Get(ctx, ref, secret)
  182. if err != nil {
  183. return "", err
  184. }
  185. keyBytes, ok := secret.Data[secretRef.Key]
  186. if !ok {
  187. return "", err
  188. }
  189. value := string(keyBytes)
  190. valueStr := strings.TrimSpace(value)
  191. return valueStr, nil
  192. }
  193. func init() {
  194. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  195. Conjur: &esv1beta1.ConjurProvider{},
  196. })
  197. }