oracle.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package oracle
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "os"
  21. "regexp"
  22. "sync"
  23. "time"
  24. "github.com/oracle/oci-go-sdk/v65/common"
  25. "github.com/oracle/oci-go-sdk/v65/common/auth"
  26. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  27. "github.com/oracle/oci-go-sdk/v65/secrets"
  28. "github.com/oracle/oci-go-sdk/v65/vault"
  29. "github.com/tidwall/gjson"
  30. corev1 "k8s.io/api/core/v1"
  31. "k8s.io/client-go/kubernetes"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  34. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  35. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  36. "github.com/external-secrets/external-secrets/pkg/utils"
  37. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  38. )
  39. const (
  40. errOracleClient = "cannot setup new oracle client: %w"
  41. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  42. errUninitalizedOracleProvider = "provider oracle is not initialized"
  43. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  44. errMissingPK = "missing PrivateKey"
  45. errMissingUser = "missing User ID"
  46. errMissingTenancy = "missing Tenancy ID"
  47. errMissingRegion = "missing Region"
  48. errMissingFingerprint = "missing Fingerprint"
  49. errMissingVault = "missing Vault"
  50. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  51. errMissingKey = "missing Key in secret: %s"
  52. errUnexpectedContent = "unexpected secret bundle content"
  53. )
  54. // https://github.com/external-secrets/external-secrets/issues/644
  55. var _ esv1beta1.SecretsClient = &VaultManagementService{}
  56. var _ esv1beta1.Provider = &VaultManagementService{}
  57. type VaultManagementService struct {
  58. Client VMInterface
  59. KmsVaultClient KmsVCInterface
  60. VaultClient VaultInterface
  61. vault string
  62. compartment string
  63. encryptionKey string
  64. workloadIdentityMutex sync.Mutex
  65. }
  66. type VMInterface interface {
  67. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  68. }
  69. type KmsVCInterface interface {
  70. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  71. }
  72. type VaultInterface interface {
  73. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  74. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  75. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  76. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  77. }
  78. const (
  79. SecretNotFound = iota
  80. SecretExists
  81. SecretAPIError
  82. )
  83. func (vms *VaultManagementService) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  84. if data.GetSecretKey() == "" {
  85. return fmt.Errorf("pushing the whole secret is not yet implemented")
  86. }
  87. value := secret.Data[data.GetSecretKey()]
  88. secretName := data.GetRemoteKey()
  89. encodedValue := base64.StdEncoding.EncodeToString(value)
  90. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  91. switch action {
  92. case SecretNotFound:
  93. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  94. CreateSecretDetails: vault.CreateSecretDetails{
  95. CompartmentId: &vms.compartment,
  96. KeyId: &vms.encryptionKey,
  97. SecretContent: vault.Base64SecretContentDetails{
  98. Content: &encodedValue,
  99. },
  100. SecretName: &secretName,
  101. VaultId: &vms.vault,
  102. },
  103. })
  104. return sanitizeOCISDKErr(err)
  105. case SecretExists:
  106. payload, err := decodeBundle(sec)
  107. if err != nil {
  108. return err
  109. }
  110. if bytes.Equal(payload, value) {
  111. return nil
  112. }
  113. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  114. SecretId: sec.SecretId,
  115. UpdateSecretDetails: vault.UpdateSecretDetails{
  116. SecretContent: vault.Base64SecretContentDetails{
  117. Content: &encodedValue,
  118. },
  119. },
  120. })
  121. return sanitizeOCISDKErr(err)
  122. default:
  123. return sanitizeOCISDKErr(err)
  124. }
  125. }
  126. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  127. secretName := remoteRef.GetRemoteKey()
  128. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  129. switch action {
  130. case SecretNotFound:
  131. return nil
  132. case SecretExists:
  133. if resp.TimeOfDeletion != nil {
  134. return nil
  135. }
  136. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  137. SecretId: resp.SecretId,
  138. })
  139. return sanitizeOCISDKErr(err)
  140. default:
  141. return sanitizeOCISDKErr(err)
  142. }
  143. }
  144. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  145. var page *string
  146. var summaries []vault.SecretSummary
  147. for {
  148. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  149. CompartmentId: &vms.compartment,
  150. Page: page,
  151. VaultId: &vms.vault,
  152. })
  153. if err != nil {
  154. return nil, sanitizeOCISDKErr(err)
  155. }
  156. summaries = append(summaries, resp.Items...)
  157. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  158. break
  159. }
  160. }
  161. return vms.filteredSummaryResult(ctx, summaries, ref)
  162. }
  163. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  164. if utils.IsNil(vms.Client) {
  165. return nil, fmt.Errorf(errUninitalizedOracleProvider)
  166. }
  167. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  168. VaultId: &vms.vault,
  169. SecretName: &ref.Key,
  170. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  171. })
  172. if err != nil {
  173. return nil, sanitizeOCISDKErr(err)
  174. }
  175. payload, err := decodeBundle(sec)
  176. if err != nil {
  177. return nil, err
  178. }
  179. if ref.Property == "" {
  180. return payload, nil
  181. }
  182. val := gjson.Get(string(payload), ref.Property)
  183. if !val.Exists() {
  184. return nil, fmt.Errorf(errMissingKey, ref.Key)
  185. }
  186. return []byte(val.String()), nil
  187. }
  188. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  189. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  190. if !ok {
  191. return nil, fmt.Errorf(errUnexpectedContent)
  192. }
  193. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  194. if err != nil {
  195. return nil, err
  196. }
  197. return payload, nil
  198. }
  199. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  200. data, err := vms.GetSecret(ctx, ref)
  201. if err != nil {
  202. return nil, sanitizeOCISDKErr(err)
  203. }
  204. kv := make(map[string]string)
  205. err = json.Unmarshal(data, &kv)
  206. if err != nil {
  207. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  208. }
  209. secretData := make(map[string][]byte)
  210. for k, v := range kv {
  211. secretData[k] = []byte(v)
  212. }
  213. return secretData, nil
  214. }
  215. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  216. func (vms *VaultManagementService) Capabilities() esv1beta1.SecretStoreCapabilities {
  217. return esv1beta1.SecretStoreReadOnly
  218. }
  219. // NewClient constructs a new secrets client based on the provided store.
  220. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  221. storeSpec := store.GetSpec()
  222. oracleSpec := storeSpec.Provider.Oracle
  223. if oracleSpec.Vault == "" {
  224. return nil, fmt.Errorf(errMissingVault)
  225. }
  226. if oracleSpec.Region == "" {
  227. return nil, fmt.Errorf(errMissingRegion)
  228. }
  229. var (
  230. err error
  231. configurationProvider common.ConfigurationProvider
  232. )
  233. if oracleSpec.PrincipalType == esv1beta1.WorkloadPrincipal {
  234. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  235. } else if oracleSpec.PrincipalType == esv1beta1.InstancePrincipal || oracleSpec.Auth == nil {
  236. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  237. } else {
  238. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  239. }
  240. if err != nil {
  241. return nil, fmt.Errorf(errOracleClient, err)
  242. }
  243. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  244. if err != nil {
  245. return nil, fmt.Errorf(errOracleClient, err)
  246. }
  247. secretManagementService.SetRegion(oracleSpec.Region)
  248. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  249. if err != nil {
  250. return nil, fmt.Errorf(errOracleClient, err)
  251. }
  252. kmsVaultClient.SetRegion(oracleSpec.Region)
  253. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  254. if err != nil {
  255. return nil, fmt.Errorf(errOracleClient, err)
  256. }
  257. vaultClient.SetRegion(oracleSpec.Region)
  258. if storeSpec.RetrySettings != nil {
  259. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  260. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  261. opts = append(opts, common.WithMaximumNumberAttempts(uint(*mr)))
  262. }
  263. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  264. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  265. if err != nil {
  266. return nil, fmt.Errorf(errOracleClient, err)
  267. }
  268. opts = append(opts, common.WithFixedBackoff(i))
  269. }
  270. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  271. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  272. RetryPolicy: &customRetryPolicy,
  273. })
  274. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  275. RetryPolicy: &customRetryPolicy,
  276. })
  277. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  278. RetryPolicy: &customRetryPolicy,
  279. })
  280. }
  281. return &VaultManagementService{
  282. Client: secretManagementService,
  283. KmsVaultClient: kmsVaultClient,
  284. VaultClient: vaultClient,
  285. vault: oracleSpec.Vault,
  286. compartment: oracleSpec.Compartment,
  287. encryptionKey: oracleSpec.EncryptionKey,
  288. }, nil
  289. }
  290. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  291. // Try to look up the secret, which will determine if we should create or update the secret.
  292. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  293. SecretName: &secretName,
  294. VaultId: &vms.vault,
  295. })
  296. // Get a PushSecret action depending on the ListSecrets response.
  297. action := getSecretBundleCode(err)
  298. return resp, action, err
  299. }
  300. func getSecretBundleCode(err error) int {
  301. if err != nil {
  302. // If we got a 404 service error, try to create the secret.
  303. //nolint:all
  304. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  305. return SecretNotFound
  306. }
  307. return SecretAPIError
  308. }
  309. // Otherwise, update the existing secret.
  310. return SecretExists
  311. }
  312. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  313. secretMap := map[string][]byte{}
  314. for _, summary := range secretSummaries {
  315. matches, err := matchesRef(summary, ref)
  316. if err != nil {
  317. return nil, err
  318. }
  319. if !matches || summary.TimeOfDeletion != nil {
  320. continue
  321. }
  322. secret, err := vms.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{
  323. Key: *summary.SecretName,
  324. })
  325. if err != nil {
  326. return nil, err
  327. }
  328. secretMap[*summary.SecretName] = secret
  329. }
  330. return secretMap, nil
  331. }
  332. func matchesRef(secretSummary vault.SecretSummary, ref esv1beta1.ExternalSecretFind) (bool, error) {
  333. if ref.Name != nil {
  334. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  335. if err != nil {
  336. return false, err
  337. }
  338. return matchString, nil
  339. }
  340. for k, v := range ref.Tags {
  341. if val, ok := secretSummary.FreeformTags[k]; ok {
  342. if val == v {
  343. return true, nil
  344. }
  345. }
  346. }
  347. return false, nil
  348. }
  349. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  350. if secretRef.Name == "" {
  351. return "", fmt.Errorf(errORACLECredSecretName)
  352. }
  353. secret, err := resolvers.SecretKeyRef(
  354. ctx,
  355. kube,
  356. storeKind,
  357. namespace,
  358. &secretRef,
  359. )
  360. if err != nil {
  361. return "", fmt.Errorf(errFetchSAKSecret, err)
  362. }
  363. return secret, nil
  364. }
  365. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1beta1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  366. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  367. if err != nil {
  368. return nil, err
  369. }
  370. if privateKey == "" {
  371. return nil, fmt.Errorf(errMissingPK)
  372. }
  373. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  374. if err != nil {
  375. return nil, err
  376. }
  377. if fingerprint == "" {
  378. return nil, fmt.Errorf(errMissingFingerprint)
  379. }
  380. if store.Auth.User == "" {
  381. return nil, fmt.Errorf(errMissingUser)
  382. }
  383. if store.Auth.Tenancy == "" {
  384. return nil, fmt.Errorf(errMissingTenancy)
  385. }
  386. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  387. }
  388. func (vms *VaultManagementService) Close(_ context.Context) error {
  389. return nil
  390. }
  391. func (vms *VaultManagementService) Validate() (esv1beta1.ValidationResult, error) {
  392. _, err := vms.KmsVaultClient.GetVault(
  393. context.Background(), keymanagement.GetVaultRequest{
  394. VaultId: &vms.vault,
  395. },
  396. )
  397. if err != nil {
  398. failure, ok := common.IsServiceError(err)
  399. if ok {
  400. code := failure.GetCode()
  401. switch code {
  402. case "NotAuthenticated":
  403. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  404. case "NotAuthorizedOrNotFound":
  405. // User authentication was successful, but user might not have a permission like:
  406. //
  407. // Allow group external_secrets to read vaults in tenancy
  408. //
  409. // Which is fine, because to read secrets we only need:
  410. //
  411. // Allow group external_secrets to read secret-family in tenancy
  412. //
  413. // But we can't test for this permission without knowing the name of a secret
  414. return esv1beta1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  415. default:
  416. return esv1beta1.ValidationResultError, sanitizeOCISDKErr(err)
  417. }
  418. } else {
  419. return esv1beta1.ValidationResultError, err
  420. }
  421. }
  422. return esv1beta1.ValidationResultReady, nil
  423. }
  424. func (vms *VaultManagementService) ValidateStore(store esv1beta1.GenericStore) error {
  425. storeSpec := store.GetSpec()
  426. oracleSpec := storeSpec.Provider.Oracle
  427. vault := oracleSpec.Vault
  428. if vault == "" {
  429. return fmt.Errorf("vault cannot be empty")
  430. }
  431. region := oracleSpec.Region
  432. if region == "" {
  433. return fmt.Errorf("region cannot be empty")
  434. }
  435. auth := oracleSpec.Auth
  436. if auth == nil {
  437. return nil
  438. }
  439. user := oracleSpec.Auth.User
  440. if user == "" {
  441. return fmt.Errorf("user cannot be empty")
  442. }
  443. tenant := oracleSpec.Auth.Tenancy
  444. if tenant == "" {
  445. return fmt.Errorf("tenant cannot be empty")
  446. }
  447. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  448. if privateKey.Name == "" {
  449. return fmt.Errorf("privateKey.name cannot be empty")
  450. }
  451. if privateKey.Key == "" {
  452. return fmt.Errorf("privateKey.key cannot be empty")
  453. }
  454. err := utils.ValidateSecretSelector(store, privateKey)
  455. if err != nil {
  456. return err
  457. }
  458. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  459. if fingerprint.Name == "" {
  460. return fmt.Errorf("fingerprint.name cannot be empty")
  461. }
  462. if fingerprint.Key == "" {
  463. return fmt.Errorf("fingerprint.key cannot be empty")
  464. }
  465. err = utils.ValidateSecretSelector(store, fingerprint)
  466. if err != nil {
  467. return err
  468. }
  469. if oracleSpec.ServiceAccountRef != nil {
  470. if err := utils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  471. return fmt.Errorf("invalid ServiceAccountRef: %w", err)
  472. }
  473. }
  474. return nil
  475. }
  476. func (vms *VaultManagementService) getWorkloadIdentityProvider(store esv1beta1.GenericStore, serviceAcccountRef *esmeta.ServiceAccountSelector, region, namespace string) (configurationProvider common.ConfigurationProvider, err error) {
  477. defer func() {
  478. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  479. err = errors.Join(err, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, uerr))
  480. }
  481. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  482. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  483. }
  484. vms.workloadIdentityMutex.Unlock()
  485. }()
  486. vms.workloadIdentityMutex.Lock()
  487. // OCI SDK requires specific environment variables for workload identity.
  488. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  489. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, err)
  490. }
  491. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  492. return nil, fmt.Errorf("unable to set OCI SDK environment variable %s: %w", auth.ResourcePrincipalRegionEnvVar, err)
  493. }
  494. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  495. if serviceAcccountRef == nil {
  496. return auth.OkeWorkloadIdentityConfigurationProvider()
  497. }
  498. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  499. if err = utils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  500. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  501. }
  502. cfg, err := ctrlcfg.GetConfig()
  503. if err != nil {
  504. return nil, err
  505. }
  506. clientset, err := kubernetes.NewForConfig(cfg)
  507. if err != nil {
  508. return nil, err
  509. }
  510. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  511. return auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  512. }
  513. func sanitizeOCISDKErr(err error) error {
  514. if err == nil {
  515. return nil
  516. }
  517. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  518. //nolint:all
  519. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  520. return fmt.Errorf("%s service failed to %s, HTTP status code %d: %s", serviceError.GetTargetService(), serviceError.GetOperationName(), serviceError.GetHTTPStatusCode(), serviceError.GetMessage())
  521. }
  522. return err
  523. }
  524. func init() {
  525. esv1beta1.Register(&VaultManagementService{}, &esv1beta1.SecretStoreProvider{
  526. Oracle: &esv1beta1.OracleProvider{},
  527. })
  528. }