provider.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "context"
  15. "fmt"
  16. authv1 "k8s.io/api/authorization/v1"
  17. v1 "k8s.io/api/core/v1"
  18. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  19. "k8s.io/client-go/kubernetes"
  20. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  21. "k8s.io/client-go/rest"
  22. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  23. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. )
  26. // https://github.com/external-secrets/external-secrets/issues/644
  27. var _ esv1beta1.SecretsClient = &Client{}
  28. var _ esv1beta1.Provider = &Provider{}
  29. type KClient interface {
  30. Get(ctx context.Context, name string, opts metav1.GetOptions) (*v1.Secret, error)
  31. List(ctx context.Context, opts metav1.ListOptions) (*v1.SecretList, error)
  32. Delete(ctx context.Context, name string, opts metav1.DeleteOptions) error
  33. Create(ctx context.Context, secret *v1.Secret, opts metav1.CreateOptions) (*v1.Secret, error)
  34. Update(ctx context.Context, secret *v1.Secret, opts metav1.UpdateOptions) (*v1.Secret, error)
  35. }
  36. type RClient interface {
  37. Create(ctx context.Context, selfSubjectRulesReview *authv1.SelfSubjectRulesReview, opts metav1.CreateOptions) (*authv1.SelfSubjectRulesReview, error)
  38. }
  39. // Provider implements Secret Provider interface
  40. // for Kubernetes.
  41. type Provider struct{}
  42. // Client implements Secret Client interface
  43. // for Kubernetes.
  44. type Client struct {
  45. // ctrlClient is a controller-runtime client
  46. // with RBAC scope of the controller (privileged!)
  47. ctrlClient kclient.Client
  48. // ctrlClientset is a client-go CoreV1() client
  49. // with RBAC scope of the controller (privileged!)
  50. ctrlClientset typedcorev1.CoreV1Interface
  51. // userSecretClient is a client-go CoreV1().Secrets() client
  52. // with user-defined scope.
  53. userSecretClient KClient
  54. // userReviewClient is a SelfSubjectAccessReview client with
  55. // user-defined scope.
  56. userReviewClient RClient
  57. // store is the Kubernetes Provider spec
  58. // which contains the configuration for this provider.
  59. store *esv1beta1.KubernetesProvider
  60. storeKind string
  61. // namespace is the namespace of the
  62. // ExternalSecret referencing this provider.
  63. namespace string
  64. Certificate []byte
  65. Key []byte
  66. CA []byte
  67. BearerToken []byte
  68. }
  69. func init() {
  70. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  71. Kubernetes: &esv1beta1.KubernetesProvider{},
  72. })
  73. }
  74. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  75. return esv1beta1.SecretStoreReadWrite
  76. }
  77. // NewClient constructs a Kubernetes Provider.
  78. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  79. restCfg, err := ctrlcfg.GetConfig()
  80. if err != nil {
  81. return nil, err
  82. }
  83. clientset, err := kubernetes.NewForConfig(restCfg)
  84. if err != nil {
  85. return nil, err
  86. }
  87. return p.newClient(ctx, store, kube, clientset, namespace)
  88. }
  89. func (p *Provider) newClient(ctx context.Context, store esv1beta1.GenericStore, ctrlClient kclient.Client, ctrlClientset kubernetes.Interface, namespace string) (esv1beta1.SecretsClient, error) {
  90. storeSpec := store.GetSpec()
  91. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Kubernetes == nil {
  92. return nil, fmt.Errorf("no store type or wrong store type")
  93. }
  94. storeSpecKubernetes := storeSpec.Provider.Kubernetes
  95. client := &Client{
  96. ctrlClientset: ctrlClientset.CoreV1(),
  97. ctrlClient: ctrlClient,
  98. store: storeSpecKubernetes,
  99. namespace: namespace,
  100. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  101. }
  102. // allow SecretStore controller validation to pass
  103. // when using referent namespace.
  104. if client.storeKind == esv1beta1.ClusterSecretStoreKind && client.namespace == "" && isReferentSpec(storeSpecKubernetes) {
  105. return client, nil
  106. }
  107. if err := client.setAuth(ctx); err != nil {
  108. return nil, err
  109. }
  110. config := &rest.Config{
  111. Host: client.store.Server.URL,
  112. BearerToken: string(client.BearerToken),
  113. TLSClientConfig: rest.TLSClientConfig{
  114. Insecure: false,
  115. CertData: client.Certificate,
  116. KeyData: client.Key,
  117. CAData: client.CA,
  118. },
  119. }
  120. userClientset, err := kubernetes.NewForConfig(config)
  121. if err != nil {
  122. return nil, fmt.Errorf("error configuring clientset: %w", err)
  123. }
  124. client.userSecretClient = userClientset.CoreV1().Secrets(client.store.RemoteNamespace)
  125. client.userReviewClient = userClientset.AuthorizationV1().SelfSubjectRulesReviews()
  126. return client, nil
  127. }
  128. func isReferentSpec(prov *esv1beta1.KubernetesProvider) bool {
  129. if prov.Auth.Cert != nil {
  130. if prov.Auth.Cert.ClientCert.Namespace == nil {
  131. return true
  132. }
  133. if prov.Auth.Cert.ClientKey.Namespace == nil {
  134. return true
  135. }
  136. }
  137. if prov.Auth.ServiceAccount != nil {
  138. if prov.Auth.ServiceAccount.Namespace == nil {
  139. return true
  140. }
  141. }
  142. if prov.Auth.Token != nil {
  143. if prov.Auth.Token.BearerToken.Namespace == nil {
  144. return true
  145. }
  146. }
  147. return false
  148. }
  149. func (p *Provider) Close(_ context.Context) error {
  150. return nil
  151. }