provider.go 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package aws implements AWS provider interfaces for External Secrets Operator,
  14. // supporting SecretManager and ParameterStore services.
  15. package aws
  16. import (
  17. "context"
  18. "fmt"
  19. "time"
  20. "github.com/aws/aws-sdk-go-v2/aws"
  21. "github.com/aws/aws-sdk-go-v2/aws/retry"
  22. "github.com/aws/aws-sdk-go-v2/config"
  23. awssm "github.com/aws/aws-sdk-go-v2/service/secretsmanager"
  24. "github.com/aws/aws-sdk-go-v2/service/ssm"
  25. "sigs.k8s.io/controller-runtime/pkg/client"
  26. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. "github.com/external-secrets/external-secrets/pkg/esutils"
  29. awsauth "github.com/external-secrets/external-secrets/pkg/provider/aws/auth"
  30. "github.com/external-secrets/external-secrets/pkg/provider/aws/parameterstore"
  31. "github.com/external-secrets/external-secrets/pkg/provider/aws/secretsmanager"
  32. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  33. )
  34. // https://github.com/external-secrets/external-secrets/issues/644
  35. var _ esv1.Provider = &Provider{}
  36. // Provider satisfies the provider interface.
  37. type Provider struct{}
  38. const (
  39. errUnableCreateSession = "unable to create session: %w"
  40. errUnknownProviderService = "unknown AWS Provider Service: %s"
  41. errRegionNotFound = "region not found: %s"
  42. errInitAWSProvider = "unable to initialize aws provider: %s"
  43. errInvalidSecretsManager = "invalid SecretsManager settings: %s"
  44. )
  45. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  46. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  47. return esv1.SecretStoreReadWrite
  48. }
  49. // NewClient constructs a new secrets client based on the provided store.
  50. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string) (esv1.SecretsClient, error) {
  51. return newClient(ctx, store, kube, namespace, awsauth.DefaultSTSProvider)
  52. }
  53. // ValidateStore validates the configuration of the AWS SecretStore.
  54. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  55. prov, err := awsutil.GetAWSProvider(store)
  56. if err != nil {
  57. return nil, err
  58. }
  59. err = validateRegion(prov)
  60. if err != nil {
  61. return nil, err
  62. }
  63. err = validateSecretsManagerConfig(prov)
  64. if err != nil {
  65. return nil, err
  66. }
  67. // case: static credentials
  68. if prov.Auth.SecretRef != nil {
  69. if err := esutils.ValidateReferentSecretSelector(store, prov.Auth.SecretRef.AccessKeyID); err != nil {
  70. return nil, fmt.Errorf("invalid Auth.SecretRef.AccessKeyID: %w", err)
  71. }
  72. if err := esutils.ValidateReferentSecretSelector(store, prov.Auth.SecretRef.SecretAccessKey); err != nil {
  73. return nil, fmt.Errorf("invalid Auth.SecretRef.SecretAccessKey: %w", err)
  74. }
  75. if prov.Auth.SecretRef.SessionToken != nil {
  76. if err := esutils.ValidateReferentSecretSelector(store, *prov.Auth.SecretRef.SessionToken); err != nil {
  77. return nil, fmt.Errorf("invalid Auth.SecretRef.SessionToken: %w", err)
  78. }
  79. }
  80. }
  81. // case: jwt credentials
  82. if prov.Auth.JWTAuth != nil && prov.Auth.JWTAuth.ServiceAccountRef != nil {
  83. if err := esutils.ValidateReferentServiceAccountSelector(store, *prov.Auth.JWTAuth.ServiceAccountRef); err != nil {
  84. return nil, fmt.Errorf("invalid Auth.JWT.ServiceAccountRef: %w", err)
  85. }
  86. }
  87. return nil, nil
  88. }
  89. func validateRegion(prov *esv1.AWSProvider) error {
  90. switch prov.Service {
  91. case esv1.AWSServiceSecretsManager:
  92. resolver := awssm.NewDefaultEndpointResolverV2()
  93. _, err := resolver.ResolveEndpoint(context.TODO(), awssm.EndpointParameters{
  94. Region: &prov.Region,
  95. })
  96. if err != nil {
  97. return fmt.Errorf(errRegionNotFound, prov.Region)
  98. }
  99. return nil
  100. case esv1.AWSServiceParameterStore:
  101. resolver := ssm.NewDefaultEndpointResolverV2()
  102. _, err := resolver.ResolveEndpoint(context.TODO(), ssm.EndpointParameters{
  103. Region: &prov.Region,
  104. })
  105. if err != nil {
  106. return fmt.Errorf(errRegionNotFound, prov.Region)
  107. }
  108. return nil
  109. }
  110. return fmt.Errorf(errUnknownProviderService, prov.Service)
  111. }
  112. func validateSecretsManagerConfig(prov *esv1.AWSProvider) error {
  113. if prov.SecretsManager == nil {
  114. return nil
  115. }
  116. return awsutil.ValidateDeleteSecretInput(awssm.DeleteSecretInput{
  117. ForceDeleteWithoutRecovery: &prov.SecretsManager.ForceDeleteWithoutRecovery,
  118. RecoveryWindowInDays: &prov.SecretsManager.RecoveryWindowInDays,
  119. })
  120. }
  121. func newClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string, assumeRoler awsauth.STSProvider) (esv1.SecretsClient, error) {
  122. prov, err := awsutil.GetAWSProvider(store)
  123. if err != nil {
  124. return nil, err
  125. }
  126. if store == nil {
  127. return nil, fmt.Errorf(errInitAWSProvider, "nil store")
  128. }
  129. storeSpec := store.GetSpec()
  130. var cfg *aws.Config
  131. // allow SecretStore controller validation to pass
  132. // when using referent namespace.
  133. if awsutil.IsReferentSpec(prov.Auth) && namespace == "" &&
  134. store.GetObjectKind().GroupVersionKind().Kind == esv1.ClusterSecretStoreKind {
  135. cfg, err := config.LoadDefaultConfig(ctx, config.WithRegion("eu-west-1"))
  136. if err != nil {
  137. return nil, fmt.Errorf(errInitAWSProvider, err)
  138. }
  139. switch prov.Service {
  140. case esv1.AWSServiceSecretsManager:
  141. return secretsmanager.New(ctx, &cfg, prov.SecretsManager, storeSpec.Provider.AWS.Prefix, true)
  142. case esv1.AWSServiceParameterStore:
  143. return parameterstore.New(ctx, &cfg, storeSpec.Provider.AWS.Prefix, true)
  144. }
  145. return nil, fmt.Errorf(errUnknownProviderService, prov.Service)
  146. }
  147. cfg, err = awsauth.New(ctx, awsauth.Opts{
  148. Store: store,
  149. Kube: kube,
  150. Namespace: namespace,
  151. AssumeRoler: assumeRoler,
  152. JWTProvider: awsauth.DefaultJWTProvider,
  153. })
  154. if err != nil {
  155. return nil, fmt.Errorf(errUnableCreateSession, err)
  156. }
  157. // Setup retry options, if present in storeSpec
  158. if storeSpec.RetrySettings != nil {
  159. var retryAmount int
  160. var retryDuration time.Duration
  161. if storeSpec.RetrySettings.MaxRetries != nil {
  162. retryAmount = int(*storeSpec.RetrySettings.MaxRetries)
  163. } else {
  164. retryAmount = 3
  165. }
  166. if storeSpec.RetrySettings.RetryInterval != nil {
  167. retryDuration, err = time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  168. }
  169. if err != nil {
  170. return nil, fmt.Errorf(errInitAWSProvider, err)
  171. }
  172. // awsRetryer := awsclient.DefaultRetryer{
  173. // NumMaxRetries: retryAmount,
  174. // MinRetryDelay: retryDuration,
  175. // MaxThrottleDelay: 120 * time.Second, Not sure how to set this in sdk go v2
  176. // }
  177. cfg.Retryer = func() aws.Retryer {
  178. return retry.AddWithMaxAttempts(
  179. retry.NewStandard(func(o *retry.StandardOptions) {
  180. if retryDuration > 0 {
  181. o.Backoff = fixedDelayer{delay: retryDuration}
  182. }
  183. }),
  184. retryAmount,
  185. )
  186. }
  187. }
  188. switch prov.Service {
  189. case esv1.AWSServiceSecretsManager:
  190. return secretsmanager.New(ctx, cfg, prov.SecretsManager, storeSpec.Provider.AWS.Prefix, false)
  191. case esv1.AWSServiceParameterStore:
  192. return parameterstore.New(ctx, cfg, storeSpec.Provider.AWS.Prefix, false)
  193. }
  194. return nil, fmt.Errorf(errUnknownProviderService, prov.Service)
  195. }
  196. // Add this type at package level.
  197. type fixedDelayer struct {
  198. delay time.Duration
  199. }
  200. func (f fixedDelayer) BackoffDelay(int, error) (time.Duration, error) {
  201. return f.delay, nil
  202. }
  203. func init() {
  204. esv1.Register(&Provider{}, &esv1.SecretStoreProvider{
  205. AWS: &esv1.AWSProvider{},
  206. }, esv1.MaintenanceStatusMaintained)
  207. }