client.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package onboardbase implements a client for interacting with Onboardbase secrets management service.
  14. package onboardbase
  15. import (
  16. "context"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/url"
  21. "strings"
  22. "time"
  23. "github.com/tidwall/gjson"
  24. corev1 "k8s.io/api/core/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. obclient "github.com/external-secrets/external-secrets/providers/v1/onboardbase/client"
  29. "github.com/external-secrets/external-secrets/runtime/esutils"
  30. "github.com/external-secrets/external-secrets/runtime/find"
  31. )
  32. const (
  33. errGetSecret = "could not get secret %s: %s"
  34. errGetSecrets = "could not get secrets %s"
  35. errUnmarshalSecretMap = "unable to unmarshal secret %s: %w"
  36. errOnboardbaseAPIKeySecretName = "missing auth.secretRef.onboardbaseAPIKey.name"
  37. errInvalidClusterStoreMissingOnboardbaseAPIKeyNamespace = "missing auth.secretRef.onboardbaseAPIKey.namespace"
  38. errFetchOnboardbaseAPIKeySecret = "unable to find find OnboardbaseAPIKey secret: %w"
  39. errMissingOnboardbaseAPIKey = "auth.secretRef.onboardbaseAPIKey.key '%s' not found in secret '%s'"
  40. errMissingOnboardbasePasscode = "auth.secretRef.onboardbasePasscode.key '%s' not found in secret '%s'"
  41. errSecretKeyFmt = "cannot find property %s in secret data for key: %q"
  42. )
  43. // Client implements the Onboardbase secrets client.
  44. type Client struct {
  45. onboardbase SecretsClientInterface
  46. onboardbaseAPIKey string
  47. onboardbasePasscode string
  48. project string
  49. environment string
  50. kube kclient.Client
  51. store *esv1.OnboardbaseProvider
  52. namespace string
  53. storeKind string
  54. }
  55. // SecretsClientInterface defines the required Onboardbase Client methods.
  56. type SecretsClientInterface interface {
  57. BaseURL() *url.URL
  58. Authenticate() error
  59. GetSecret(request obclient.SecretRequest) (*obclient.SecretResponse, error)
  60. DeleteSecret(request obclient.SecretRequest) error
  61. GetSecrets(request obclient.SecretsRequest) (*obclient.SecretsResponse, error)
  62. }
  63. func (c *Client) setAuth(ctx context.Context) error {
  64. credentialsSecret := &corev1.Secret{}
  65. credentialsSecretName := c.store.Auth.OnboardbaseAPIKeyRef.Name
  66. if credentialsSecretName == "" {
  67. return errors.New(errOnboardbaseAPIKeySecretName)
  68. }
  69. objectKey := types.NamespacedName{
  70. Name: credentialsSecretName,
  71. Namespace: c.namespace,
  72. }
  73. // only ClusterStore is allowed to set namespace (and then it's required)
  74. if c.storeKind == esv1.ClusterSecretStoreKind {
  75. if c.store.Auth.OnboardbaseAPIKeyRef.Namespace == nil {
  76. return errors.New(errInvalidClusterStoreMissingOnboardbaseAPIKeyNamespace)
  77. }
  78. objectKey.Namespace = *c.store.Auth.OnboardbaseAPIKeyRef.Namespace
  79. }
  80. err := c.kube.Get(ctx, objectKey, credentialsSecret)
  81. if err != nil {
  82. return fmt.Errorf(errFetchOnboardbaseAPIKeySecret, err)
  83. }
  84. onboardbaseAPIKey := credentialsSecret.Data[c.store.Auth.OnboardbaseAPIKeyRef.Key]
  85. if (onboardbaseAPIKey == nil) || (len(onboardbaseAPIKey) == 0) {
  86. return fmt.Errorf(errMissingOnboardbaseAPIKey, c.store.Auth.OnboardbaseAPIKeyRef.Key, credentialsSecretName)
  87. }
  88. c.onboardbaseAPIKey = string(onboardbaseAPIKey)
  89. onboardbasePasscode := credentialsSecret.Data[c.store.Auth.OnboardbasePasscodeRef.Key]
  90. if (onboardbasePasscode == nil) || (len(onboardbasePasscode) == 0) {
  91. return fmt.Errorf(errMissingOnboardbasePasscode, c.store.Auth.OnboardbasePasscodeRef.Key, credentialsSecretName)
  92. }
  93. c.onboardbasePasscode = string(onboardbasePasscode)
  94. return nil
  95. }
  96. // Validate performs validation of the Onboardbase client configuration.
  97. func (c *Client) Validate() (esv1.ValidationResult, error) {
  98. timeout := 15 * time.Second
  99. clientURL := c.onboardbase.BaseURL().String()
  100. if err := esutils.NetworkValidate(clientURL, timeout); err != nil {
  101. return esv1.ValidationResultError, err
  102. }
  103. if err := c.onboardbase.Authenticate(); err != nil {
  104. return esv1.ValidationResultError, err
  105. }
  106. return esv1.ValidationResultReady, nil
  107. }
  108. // DeleteSecret removes a secret from Onboardbase.
  109. func (c *Client) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  110. // not implemented
  111. return nil
  112. }
  113. // SecretExists checks if a secret exists in Onboardbase.
  114. func (c *Client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  115. // not implemented
  116. return false, nil
  117. }
  118. // PushSecret creates or updates a secret in Onboardbase.
  119. func (c *Client) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1.PushSecretData) error {
  120. // not implemented
  121. return nil
  122. }
  123. // GetSecret retrieves a secret from Onboardbase by its reference.
  124. func (c *Client) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  125. request := obclient.SecretRequest{
  126. Project: c.project,
  127. Environment: c.environment,
  128. Name: ref.Key,
  129. }
  130. secret, err := c.onboardbase.GetSecret(request)
  131. if err != nil {
  132. return nil, fmt.Errorf(errGetSecret, ref.Key, err)
  133. }
  134. value := secret.Value
  135. if ref.Property != "" {
  136. jsonRes := gjson.Get(secret.Value, ref.Property)
  137. if !jsonRes.Exists() {
  138. return nil, fmt.Errorf(errSecretKeyFmt, ref.Property, ref.Key)
  139. }
  140. value = jsonRes.Raw
  141. }
  142. return []byte(value), nil
  143. }
  144. // GetSecretMap retrieves a secret from Onboardbase and returns it as a map.
  145. func (c *Client) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  146. data, err := c.GetSecret(ctx, ref)
  147. if err != nil {
  148. return nil, err
  149. }
  150. kv := make(map[string]json.RawMessage)
  151. err = json.Unmarshal(data, &kv)
  152. if err != nil {
  153. return nil, fmt.Errorf(errUnmarshalSecretMap, ref.Key, err)
  154. }
  155. secretData := make(map[string][]byte)
  156. for k, v := range kv {
  157. var strVal string
  158. err = json.Unmarshal(v, &strVal)
  159. if err == nil {
  160. secretData[k] = []byte(strVal)
  161. } else {
  162. secretData[k] = v
  163. }
  164. }
  165. return secretData, nil
  166. }
  167. // GetAllSecrets retrieves all secrets from Onboardbase that match the given criteria.
  168. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  169. if len(ref.Tags) > 0 {
  170. return nil, errors.New("find by tags not supported")
  171. }
  172. secrets, err := c.getSecrets(ctx)
  173. if err != nil {
  174. return nil, err
  175. }
  176. if ref.Name == nil && ref.Path == nil {
  177. return secrets, nil
  178. }
  179. var matcher *find.Matcher
  180. if ref.Name != nil {
  181. m, err := find.New(*ref.Name)
  182. if err != nil {
  183. return nil, err
  184. }
  185. matcher = m
  186. }
  187. selected := map[string][]byte{}
  188. for key, value := range secrets {
  189. if (matcher != nil && !matcher.MatchName(key)) || (ref.Path != nil && !strings.HasPrefix(key, *ref.Path)) {
  190. continue
  191. }
  192. selected[key] = value
  193. }
  194. return selected, nil
  195. }
  196. // Close implements cleanup operations for the Onboardbase client.
  197. func (c *Client) Close(_ context.Context) error {
  198. return nil
  199. }
  200. func (c *Client) getSecrets(_ context.Context) (map[string][]byte, error) {
  201. request := obclient.SecretsRequest{
  202. Project: c.project,
  203. Environment: c.environment,
  204. }
  205. response, err := c.onboardbase.GetSecrets(request)
  206. if err != nil {
  207. return nil, fmt.Errorf(errGetSecrets, err)
  208. }
  209. return externalSecretsFormat(response.Secrets), nil
  210. }
  211. func externalSecretsFormat(secrets obclient.Secrets) map[string][]byte {
  212. converted := make(map[string][]byte, len(secrets))
  213. for key, value := range secrets {
  214. converted[key] = []byte(value)
  215. }
  216. return converted
  217. }