oracle.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "os"
  21. "regexp"
  22. "sync"
  23. "time"
  24. "github.com/oracle/oci-go-sdk/v65/common"
  25. "github.com/oracle/oci-go-sdk/v65/common/auth"
  26. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  27. "github.com/oracle/oci-go-sdk/v65/secrets"
  28. "github.com/oracle/oci-go-sdk/v65/vault"
  29. "github.com/tidwall/gjson"
  30. corev1 "k8s.io/api/core/v1"
  31. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  32. "k8s.io/apimachinery/pkg/types"
  33. "k8s.io/client-go/kubernetes"
  34. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  35. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  36. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  37. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  38. "github.com/external-secrets/external-secrets/pkg/utils"
  39. )
  40. const (
  41. errOracleClient = "cannot setup new oracle client: %w"
  42. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  43. errUninitalizedOracleProvider = "provider oracle is not initialized"
  44. errInvalidClusterStoreMissingSKNamespace = "invalid ClusterStore, missing namespace"
  45. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  46. errMissingPK = "missing PrivateKey"
  47. errMissingUser = "missing User ID"
  48. errMissingTenancy = "missing Tenancy ID"
  49. errMissingRegion = "missing Region"
  50. errMissingFingerprint = "missing Fingerprint"
  51. errMissingVault = "missing Vault"
  52. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  53. errMissingKey = "missing Key in secret: %s"
  54. errUnexpectedContent = "unexpected secret bundle content"
  55. )
  56. // https://github.com/external-secrets/external-secrets/issues/644
  57. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  58. var _ esv1beta1.Provider = &VaultManagementService{}
  59. type VaultManagementService struct {
  60. Client VMInterface
  61. KmsVaultClient KmsVCInterface
  62. VaultClient VaultInterface
  63. vault string
  64. compartment string
  65. encryptionKey string
  66. workloadIdentityMutex sync.Mutex
  67. }
  68. type VMInterface interface {
  69. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  70. }
  71. type KmsVCInterface interface {
  72. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  73. }
  74. type VaultInterface interface {
  75. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  76. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  77. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  78. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  79. }
  80. const (
  81. SecretNotFound = iota
  82. SecretExists
  83. SecretAPIError
  84. )
  85. func (vms *VaultManagementService) PushSecret(ctx context.Context, value []byte, _ corev1.SecretType, _ *apiextensionsv1.JSON, remoteRef esv1beta1.PushRemoteRef) error {
  86. secretName := remoteRef.GetRemoteKey()
  87. encodedValue := base64.StdEncoding.EncodeToString(value)
  88. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  89. switch action {
  90. case SecretNotFound:
  91. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  92. CreateSecretDetails: vault.CreateSecretDetails{
  93. CompartmentId: &vms.compartment,
  94. KeyId: &vms.encryptionKey,
  95. SecretContent: vault.Base64SecretContentDetails{
  96. Content: &encodedValue,
  97. },
  98. SecretName: &secretName,
  99. VaultId: &vms.vault,
  100. },
  101. })
  102. return sanitizeOCISDKErr(err)
  103. case SecretExists:
  104. payload, err := decodeBundle(sec)
  105. if err != nil {
  106. return err
  107. }
  108. if bytes.Equal(payload, value) {
  109. return nil
  110. }
  111. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  112. SecretId: sec.SecretId,
  113. UpdateSecretDetails: vault.UpdateSecretDetails{
  114. SecretContent: vault.Base64SecretContentDetails{
  115. Content: &encodedValue,
  116. },
  117. },
  118. })
  119. return sanitizeOCISDKErr(err)
  120. default:
  121. return sanitizeOCISDKErr(err)
  122. }
  123. }
  124. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  125. secretName := remoteRef.GetRemoteKey()
  126. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  127. switch action {
  128. case SecretNotFound:
  129. return nil
  130. case SecretExists:
  131. if resp.TimeOfDeletion != nil {
  132. return nil
  133. }
  134. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  135. SecretId: resp.SecretId,
  136. })
  137. return sanitizeOCISDKErr(err)
  138. default:
  139. return sanitizeOCISDKErr(err)
  140. }
  141. }
  142. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  143. var page *string
  144. var summaries []vault.SecretSummary
  145. for {
  146. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  147. CompartmentId: &vms.compartment,
  148. Page: page,
  149. VaultId: &vms.vault,
  150. })
  151. if err != nil {
  152. return nil, sanitizeOCISDKErr(err)
  153. }
  154. summaries = append(summaries, resp.Items...)
  155. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  156. break
  157. }
  158. }
  159. return vms.filteredSummaryResult(ctx, summaries, ref)
  160. }
  161. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  162. if utils.IsNil(vms.Client) {
  163. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  164. }
  165. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  166. VaultId: &vms.vault,
  167. SecretName: &ref.Key,
  168. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  169. })
  170. if err != nil {
  171. return nil, sanitizeOCISDKErr(err)
  172. }
  173. payload, err := decodeBundle(sec)
  174. if err != nil {
  175. return nil, err
  176. }
  177. if ref.Property == "" {
  178. return payload, nil
  179. }
  180. val := gjson.Get(string(payload), ref.Property)
  181. if !val.Exists() {
  182. return nil, fmt.Errorf(errMissingKey, ref.Key)
  183. }
  184. return []byte(val.String()), nil
  185. }
  186. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  187. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  188. if !ok {
  189. return nil, fmt.Errorf(errUnexpectedContent)
  190. }
  191. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  192. if err != nil {
  193. return nil, err
  194. }
  195. return payload, nil
  196. }
  197. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  198. data, err := vms.GetSecret(ctx, ref)
  199. if err != nil {
  200. return nil, sanitizeOCISDKErr(err)
  201. }
  202. kv := make(map[string]string)
  203. err = json.Unmarshal(data, &kv)
  204. if err != nil {
  205. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  206. }
  207. secretData := make(map[string][]byte)
  208. for k, v := range kv {
  209. secretData[k] = []byte(v)
  210. }
  211. return secretData, nil
  212. }
  213. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  214. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  215. return esv1beta1.SecretStoreReadOnly
  216. }
  217. // NewClient constructs a new secrets client based on the provided store.
  218. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  219. storeSpec := store.GetSpec()
  220. oracleSpec := storeSpec.Provider.Oracle
  221. if oracleSpec.Vault == "" {
  222. return nil, fmt.Errorf(errMissingVault)
  223. }
  224. if oracleSpec.Region == "" {
  225. return nil, fmt.Errorf(errMissingRegion)
  226. }
  227. var (
  228. err error
  229. configurationProvider common.ConfigurationProvider
  230. )
  231. if oracleSpec.PrincipalType == esv1beta1.WorkloadPrincipal {
  232. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  233. } else if oracleSpec.PrincipalType == esv1beta1.InstancePrincipal || oracleSpec.Auth == nil {
  234. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  235. } else {
  236. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  237. }
  238. if err != nil {
  239. return nil, fmt.Errorf(errOracleClient, err)
  240. }
  241. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  242. if err != nil {
  243. return nil, fmt.Errorf(errOracleClient, err)
  244. }
  245. secretManagementService.SetRegion(oracleSpec.Region)
  246. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  247. if err != nil {
  248. return nil, fmt.Errorf(errOracleClient, err)
  249. }
  250. kmsVaultClient.SetRegion(oracleSpec.Region)
  251. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  252. if err != nil {
  253. return nil, fmt.Errorf(errOracleClient, err)
  254. }
  255. vaultClient.SetRegion(oracleSpec.Region)
  256. if storeSpec.RetrySettings != nil {
  257. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  258. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  259. opts = append(opts, common.WithMaximumNumberAttempts(uint(*mr)))
  260. }
  261. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  262. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  263. if err != nil {
  264. return nil, fmt.Errorf(errOracleClient, err)
  265. }
  266. opts = append(opts, common.WithFixedBackoff(i))
  267. }
  268. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  269. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  270. RetryPolicy: &customRetryPolicy,
  271. })
  272. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  273. RetryPolicy: &customRetryPolicy,
  274. })
  275. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  276. RetryPolicy: &customRetryPolicy,
  277. })
  278. }
  279. return &VaultManagementService{
  280. Client: secretManagementService,
  281. KmsVaultClient: kmsVaultClient,
  282. VaultClient: vaultClient,
  283. vault: oracleSpec.Vault,
  284. compartment: oracleSpec.Compartment,
  285. encryptionKey: oracleSpec.EncryptionKey,
  286. }, nil
  287. }
  288. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  289. // Try to look up the secret, which will determine if we should create or update the secret.
  290. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  291. SecretName: &secretName,
  292. VaultId: &vms.vault,
  293. })
  294. // Get a PushSecret action depending on the ListSecrets response.
  295. action := getSecretBundleCode(err)
  296. return resp, action, err
  297. }
  298. func getSecretBundleCode(err error) int {
  299. if err != nil {
  300. // If we got a 404 service error, try to create the secret.
  301. //nolint:all
  302. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  303. return SecretNotFound
  304. }
  305. return SecretAPIError
  306. }
  307. // Otherwise, update the existing secret.
  308. return SecretExists
  309. }
  310. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  311. secretMap := map[string][]byte{}
  312. for _, summary := range secretSummaries {
  313. matches, err := matchesRef(summary, ref)
  314. if err != nil {
  315. return nil, err
  316. }
  317. if !matches || summary.TimeOfDeletion != nil {
  318. continue
  319. }
  320. secret, err := vms.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{
  321. Key: *summary.SecretName,
  322. })
  323. if err != nil {
  324. return nil, err
  325. }
  326. secretMap[*summary.SecretName] = secret
  327. }
  328. return secretMap, nil
  329. }
  330. func matchesRef(secretSummary vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (bool, error) {
  331. if ref.Name != nil {
  332. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  333. if err != nil {
  334. return false, err
  335. }
  336. return matchString, nil
  337. }
  338. for k, v := range ref.Tags {
  339. if val, ok := secretSummary.FreeformTags[k]; ok {
  340. if val == v {
  341. return true, nil
  342. }
  343. }
  344. }
  345. return false, nil
  346. }
  347. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  348. if secretRef.Name == "" {
  349. return "", fmt.Errorf(errORACLECredSecretName)
  350. }
  351. objectKey := types.NamespacedName{
  352. Name: secretRef.Name,
  353. Namespace: namespace,
  354. }
  355. // only ClusterStore is allowed to set namespace (and then it's required)
  356. if storeKind == esv1beta1.ClusterSecretStoreKind {
  357. if secretRef.Namespace == nil {
  358. return "", fmt.Errorf(errInvalidClusterStoreMissingSKNamespace)
  359. }
  360. objectKey.Namespace = *secretRef.Namespace
  361. }
  362. secret := corev1.Secret{}
  363. err := kube.Get(ctx, objectKey, &secret)
  364. if err != nil {
  365. return "", fmt.Errorf(errFetchSAKSecret, err)
  366. }
  367. return string(secret.Data[secretRef.Key]), nil
  368. }
  369. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  370. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  371. if err != nil {
  372. return nil, err
  373. }
  374. if privateKey == "" {
  375. return nil, fmt.Errorf(errMissingPK)
  376. }
  377. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  378. if err != nil {
  379. return nil, err
  380. }
  381. if fingerprint == "" {
  382. return nil, fmt.Errorf(errMissingFingerprint)
  383. }
  384. if store.Auth.User == "" {
  385. return nil, fmt.Errorf(errMissingUser)
  386. }
  387. if store.Auth.Tenancy == "" {
  388. return nil, fmt.Errorf(errMissingTenancy)
  389. }
  390. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  391. }
  392. func (vms *VaultManagementService) Close(_ context.Context) error {
  393. return nil
  394. }
  395. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  396. _, err := vms.KmsVaultClient.GetVault(
  397. context.Background(), keymanagement.GetVaultRequest{
  398. VaultId: &vms.vault,
  399. },
  400. )
  401. if err != nil {
  402. failure, ok := common.IsServiceError(err)
  403. if ok {
  404. code := failure.GetCode()
  405. switch code {
  406. case "NotAuthenticated":
  407. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  408. case "NotAuthorizedOrNotFound":
  409. // User authentication was successful, but user might not have a permission like:
  410. //
  411. // Allow group external_secrets to read vaults in tenancy
  412. //
  413. // Which is fine, because to read secrets we only need:
  414. //
  415. // Allow group external_secrets to read secret-family in tenancy
  416. //
  417. // But we can't test for this permission without knowing the name of a secret
  418. return esv1beta1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  419. default:
  420. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  421. }
  422. } else {
  423. return esv1beta1.ValidationResultError, err
  424. }
  425. }
  426. return esv1beta1.ValidationResultReady, nil
  427. }
  428. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  429. storeSpec := store.GetSpec()
  430. oracleSpec := storeSpec.Provider.Oracle
  431. vault := oracleSpec.Vault
  432. if vault == "" {
  433. return fmt.Errorf("vault cannot be empty")
  434. }
  435. region := oracleSpec.Region
  436. if region == "" {
  437. return fmt.Errorf("region cannot be empty")
  438. }
  439. auth := oracleSpec.Auth
  440. if auth == nil {
  441. return nil
  442. }
  443. user := oracleSpec.Auth.User
  444. if user == "" {
  445. return fmt.Errorf("user cannot be empty")
  446. }
  447. tenant := oracleSpec.Auth.Tenancy
  448. if tenant == "" {
  449. return fmt.Errorf("tenant cannot be empty")
  450. }
  451. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  452. if privateKey.Name == "" {
  453. return fmt.Errorf("privateKey.name cannot be empty")
  454. }
  455. if privateKey.Key == "" {
  456. return fmt.Errorf("privateKey.key cannot be empty")
  457. }
  458. err := utils.ValidateSecretSelector(store, privateKey)
  459. if err != nil {
  460. return err
  461. }
  462. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  463. if fingerprint.Name == "" {
  464. return fmt.Errorf("fingerprint.name cannot be empty")
  465. }
  466. if fingerprint.Key == "" {
  467. return fmt.Errorf("fingerprint.key cannot be empty")
  468. }
  469. err = utils.ValidateSecretSelector(store, fingerprint)
  470. if err != nil {
  471. return err
  472. }
  473. if oracleSpec.ServiceAccountRef != nil {
  474. if err := utils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  475. return fmt.Errorf("invalid ServiceAccountRef: %w", err)
  476. }
  477. }
  478. return nil
  479. }
  480. func (vms *VaultManagementService) getWorkloadIdentityProvider(store esv1beta1.GenericStore, serviceAcccountRef *esmeta.ServiceAccountSelector, region, namespace string) (configurationProvider common.ConfigurationProvider, err error) {
  481. defer func() {
  482. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  483. err = errors.Join(err, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, uerr))
  484. }
  485. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  486. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  487. }
  488. vms.workloadIdentityMutex.Unlock()
  489. }()
  490. vms.workloadIdentityMutex.Lock()
  491. // OCI SDK requires specific environment variables for workload identity.
  492. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  493. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, err)
  494. }
  495. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  496. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, err)
  497. }
  498. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  499. if serviceAcccountRef == nil {
  500. return auth.OkeWorkloadIdentityConfigurationProvider()
  501. }
  502. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  503. if err = utils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  504. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  505. }
  506. cfg, err := ctrlcfg.GetConfig()
  507. if err != nil {
  508. return nil, err
  509. }
  510. clientset, err := kubernetes.NewForConfig(cfg)
  511. if err != nil {
  512. return nil, err
  513. }
  514. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  515. return auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  516. }
  517. func sanitizeOCISDKErr(err error) error {
  518. if err == nil {
  519. return nil
  520. }
  521. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  522. //nolint:all
  523. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  524. return fmt.Errorf("%s service failed to %s, HTTP status code %d: %s", serviceError.GetTargetService(), serviceError.GetOperationName(), serviceError.GetHTTPStatusCode(), serviceError.GetMessage())
  525. }
  526. return err
  527. }
  528. func init() {
  529. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  530. Oracle: &esv1beta1.OracleProvider{},
  531. })
  532. }