oracle.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package oracle implements a provider for Oracle Cloud Infrastructure Vault.
  14. // It allows fetching and managing secrets stored in OCI Vault using the OCI SDK.
  15. package oracle
  16. import (
  17. "bytes"
  18. "context"
  19. "encoding/base64"
  20. "encoding/json"
  21. "errors"
  22. "fmt"
  23. "os"
  24. "regexp"
  25. "sync"
  26. "time"
  27. "github.com/oracle/oci-go-sdk/v65/common"
  28. "github.com/oracle/oci-go-sdk/v65/common/auth"
  29. "github.com/oracle/oci-go-sdk/v65/keymanagement"
  30. "github.com/oracle/oci-go-sdk/v65/secrets"
  31. "github.com/oracle/oci-go-sdk/v65/vault"
  32. "github.com/tidwall/gjson"
  33. corev1 "k8s.io/api/core/v1"
  34. "k8s.io/client-go/kubernetes"
  35. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  36. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  37. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  38. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  39. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  40. "github.com/external-secrets/external-secrets/runtime/esutils"
  41. "github.com/external-secrets/external-secrets/runtime/esutils/resolvers"
  42. )
  43. const (
  44. errOracleClient = "cannot setup new oracle client: %w"
  45. errORACLECredSecretName = "invalid oracle SecretStore resource: missing oracle APIKey"
  46. errUninitalizedOracleProvider = "provider oracle is not initialized"
  47. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  48. errMissingPK = "missing PrivateKey"
  49. errMissingUser = "missing User ID"
  50. errMissingTenancy = "missing Tenancy ID"
  51. errMissingRegion = "missing Region"
  52. errMissingFingerprint = "missing Fingerprint"
  53. errMissingVault = "missing Vault"
  54. errJSONSecretUnmarshal = "unable to unmarshal secret from JSON: %w"
  55. errMissingKey = "missing Key in secret: %s"
  56. errUnexpectedContent = "unexpected secret bundle content"
  57. errSettingOCIEnvVariables = "unable to set OCI SDK environment variable %s: %w"
  58. )
  59. const (
  60. authConfigurationsCachePoolSize = 50
  61. )
  62. // https://github.com/external-secrets/external-secrets/issues/644
  63. var _ esv1.SecretsClient = &VaultManagementService{}
  64. var _ esv1.Provider = &VaultManagementService{}
  65. // VaultManagementService implements the External Secrets provider interface for Oracle Cloud Infrastructure Vault.
  66. type VaultManagementService struct {
  67. Client VMInterface
  68. KmsVaultClient KmsVCInterface
  69. VaultClient VaultInterface
  70. vault string
  71. compartment string
  72. encryptionKey string
  73. workloadIdentityMutex sync.Mutex
  74. authConfigurationsCache map[string]auth.ConfigurationProviderWithClaimAccess
  75. }
  76. // VMInterface defines the interface for OCI Secrets Management Client operations.
  77. type VMInterface interface {
  78. GetSecretBundleByName(ctx context.Context, request secrets.GetSecretBundleByNameRequest) (secrets.GetSecretBundleByNameResponse, error)
  79. }
  80. // KmsVCInterface defines the interface for OCI Key Management Service Vault Client operations.
  81. type KmsVCInterface interface {
  82. GetVault(ctx context.Context, request keymanagement.GetVaultRequest) (response keymanagement.GetVaultResponse, err error)
  83. }
  84. // VaultInterface defines the interface for OCI Vault operations.
  85. type VaultInterface interface {
  86. ListSecrets(ctx context.Context, request vault.ListSecretsRequest) (response vault.ListSecretsResponse, err error)
  87. CreateSecret(ctx context.Context, request vault.CreateSecretRequest) (response vault.CreateSecretResponse, err error)
  88. UpdateSecret(ctx context.Context, request vault.UpdateSecretRequest) (response vault.UpdateSecretResponse, err error)
  89. ScheduleSecretDeletion(ctx context.Context, request vault.ScheduleSecretDeletionRequest) (response vault.ScheduleSecretDeletionResponse, err error)
  90. }
  91. const (
  92. // SecretNotFound indicates that the requested secret was not found in the vault.
  93. SecretNotFound = iota
  94. // SecretExists indicates that the secret exists in the vault.
  95. SecretExists
  96. // SecretAPIError indicates that an API error occurred while accessing the secret.
  97. SecretAPIError
  98. )
  99. // PushSecret creates or updates a secret in the Oracle Cloud Infrastructure Vault.
  100. func (vms *VaultManagementService) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  101. if vms.encryptionKey == "" {
  102. return errors.New("SecretStore must reference encryption key")
  103. }
  104. value := secret.Data[data.GetSecretKey()]
  105. if data.GetSecretKey() == "" {
  106. secretData := map[string]string{}
  107. for k, v := range secret.Data {
  108. secretData[k] = string(v)
  109. }
  110. jsonSecret, err := json.Marshal(secretData)
  111. if err != nil {
  112. return fmt.Errorf("unable to create json %v from value: %v", value, secretData)
  113. }
  114. value = jsonSecret
  115. }
  116. secretName := data.GetRemoteKey()
  117. encodedValue := base64.StdEncoding.EncodeToString(value)
  118. sec, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  119. switch action {
  120. case SecretNotFound:
  121. _, err = vms.VaultClient.CreateSecret(ctx, vault.CreateSecretRequest{
  122. CreateSecretDetails: vault.CreateSecretDetails{
  123. CompartmentId: &vms.compartment,
  124. KeyId: &vms.encryptionKey,
  125. SecretContent: vault.Base64SecretContentDetails{
  126. Content: &encodedValue,
  127. },
  128. SecretName: &secretName,
  129. VaultId: &vms.vault,
  130. },
  131. })
  132. return sanitizeOCISDKErr(err)
  133. case SecretExists:
  134. payload, err := decodeBundle(sec)
  135. if err != nil {
  136. return err
  137. }
  138. if bytes.Equal(payload, value) {
  139. return nil
  140. }
  141. _, err = vms.VaultClient.UpdateSecret(ctx, vault.UpdateSecretRequest{
  142. SecretId: sec.SecretId,
  143. UpdateSecretDetails: vault.UpdateSecretDetails{
  144. SecretContent: vault.Base64SecretContentDetails{
  145. Content: &encodedValue,
  146. },
  147. },
  148. })
  149. return sanitizeOCISDKErr(err)
  150. default:
  151. return sanitizeOCISDKErr(err)
  152. }
  153. }
  154. // DeleteSecret removes a secret from the Oracle Cloud Infrastructure Vault.
  155. func (vms *VaultManagementService) DeleteSecret(ctx context.Context, remoteRef esv1.PushSecretRemoteRef) error {
  156. secretName := remoteRef.GetRemoteKey()
  157. resp, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  158. switch action {
  159. case SecretNotFound:
  160. return nil
  161. case SecretExists:
  162. if resp.TimeOfDeletion != nil {
  163. return nil
  164. }
  165. _, err = vms.VaultClient.ScheduleSecretDeletion(ctx, vault.ScheduleSecretDeletionRequest{
  166. SecretId: resp.SecretId,
  167. })
  168. return sanitizeOCISDKErr(err)
  169. default:
  170. return sanitizeOCISDKErr(err)
  171. }
  172. }
  173. // SecretExists checks if a secret exists in the Oracle Cloud Infrastructure Vault.
  174. func (vms *VaultManagementService) SecretExists(ctx context.Context, pushSecretRef esv1.PushSecretRemoteRef) (bool, error) {
  175. secretName := pushSecretRef.GetRemoteKey()
  176. _, action, err := vms.getSecretBundleWithCode(ctx, secretName)
  177. switch action {
  178. case SecretNotFound:
  179. return false, nil
  180. case SecretExists:
  181. return true, nil
  182. default:
  183. return false, sanitizeOCISDKErr(err)
  184. }
  185. }
  186. // GetAllSecrets retrieves all secrets from the Oracle Cloud Infrastructure Vault that match the given criteria.
  187. func (vms *VaultManagementService) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  188. var page *string
  189. var summaries []vault.SecretSummary
  190. for {
  191. resp, err := vms.VaultClient.ListSecrets(ctx, vault.ListSecretsRequest{
  192. CompartmentId: &vms.compartment,
  193. Page: page,
  194. VaultId: &vms.vault,
  195. })
  196. if err != nil {
  197. return nil, sanitizeOCISDKErr(err)
  198. }
  199. summaries = append(summaries, resp.Items...)
  200. if page = resp.OpcNextPage; resp.OpcNextPage == nil {
  201. break
  202. }
  203. }
  204. return vms.filteredSummaryResult(ctx, summaries, ref)
  205. }
  206. // GetSecret retrieves a specific secret from the Oracle Cloud Infrastructure Vault.
  207. func (vms *VaultManagementService) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  208. if esutils.IsNil(vms.Client) {
  209. return nil, errors.New(errUninitalizedOracleProvider)
  210. }
  211. sec, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  212. VaultId: &vms.vault,
  213. SecretName: &ref.Key,
  214. Stage: secrets.GetSecretBundleByNameStageEnum(ref.Version),
  215. })
  216. if err != nil {
  217. return nil, sanitizeOCISDKErr(err)
  218. }
  219. payload, err := decodeBundle(sec)
  220. if err != nil {
  221. return nil, err
  222. }
  223. if ref.Property == "" {
  224. return payload, nil
  225. }
  226. val := gjson.Get(string(payload), ref.Property)
  227. if !val.Exists() {
  228. return nil, fmt.Errorf(errMissingKey, ref.Key)
  229. }
  230. return []byte(val.String()), nil
  231. }
  232. func decodeBundle(sec secrets.GetSecretBundleByNameResponse) ([]byte, error) {
  233. bt, ok := sec.SecretBundleContent.(secrets.Base64SecretBundleContentDetails)
  234. if !ok {
  235. return nil, errors.New(errUnexpectedContent)
  236. }
  237. payload, err := base64.StdEncoding.DecodeString(*bt.Content)
  238. if err != nil {
  239. return nil, err
  240. }
  241. return payload, nil
  242. }
  243. // GetSecretMap retrieves a secret and returns it as a map of key/value pairs.
  244. func (vms *VaultManagementService) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  245. data, err := vms.GetSecret(ctx, ref)
  246. if err != nil {
  247. return nil, sanitizeOCISDKErr(err)
  248. }
  249. kv := make(map[string]string)
  250. err = json.Unmarshal(data, &kv)
  251. if err != nil {
  252. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  253. }
  254. secretData := make(map[string][]byte)
  255. for k, v := range kv {
  256. secretData[k] = []byte(v)
  257. }
  258. return secretData, nil
  259. }
  260. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  261. func (vms *VaultManagementService) Capabilities() esv1.SecretStoreCapabilities {
  262. return esv1.SecretStoreReadWrite
  263. }
  264. // NewClient constructs a new secrets client based on the provided store.
  265. func (vms *VaultManagementService) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  266. storeSpec := store.GetSpec()
  267. oracleSpec := storeSpec.Provider.Oracle
  268. if oracleSpec.Vault == "" {
  269. return nil, errors.New(errMissingVault)
  270. }
  271. if oracleSpec.Region == "" {
  272. return nil, errors.New(errMissingRegion)
  273. }
  274. configurationProvider, err := vms.constructProvider(ctx, store, oracleSpec, kube, namespace)
  275. if err != nil {
  276. return nil, err
  277. }
  278. secretManagementService, err := secrets.NewSecretsClientWithConfigurationProvider(configurationProvider)
  279. if err != nil {
  280. return nil, fmt.Errorf(errOracleClient, err)
  281. }
  282. secretManagementService.SetRegion(oracleSpec.Region)
  283. kmsVaultClient, err := keymanagement.NewKmsVaultClientWithConfigurationProvider(configurationProvider)
  284. if err != nil {
  285. return nil, fmt.Errorf(errOracleClient, err)
  286. }
  287. kmsVaultClient.SetRegion(oracleSpec.Region)
  288. vaultClient, err := vault.NewVaultsClientWithConfigurationProvider(configurationProvider)
  289. if err != nil {
  290. return nil, fmt.Errorf(errOracleClient, err)
  291. }
  292. vaultClient.SetRegion(oracleSpec.Region)
  293. if storeSpec.RetrySettings != nil {
  294. if err := vms.configureRetryPolicy(storeSpec, secretManagementService, kmsVaultClient, vaultClient); err != nil {
  295. return nil, fmt.Errorf(errOracleClient, err)
  296. }
  297. }
  298. return &VaultManagementService{
  299. Client: secretManagementService,
  300. KmsVaultClient: kmsVaultClient,
  301. VaultClient: vaultClient,
  302. vault: oracleSpec.Vault,
  303. compartment: oracleSpec.Compartment,
  304. encryptionKey: oracleSpec.EncryptionKey,
  305. }, nil
  306. }
  307. func (vms *VaultManagementService) constructOptions(storeSpec *esv1.SecretStoreSpec) ([]common.RetryPolicyOption, error) {
  308. opts := []common.RetryPolicyOption{common.WithShouldRetryOperation(common.DefaultShouldRetryOperation)}
  309. if mr := storeSpec.RetrySettings.MaxRetries; mr != nil {
  310. attempts := safeConvert(*mr)
  311. opts = append(opts, common.WithMaximumNumberAttempts(attempts))
  312. }
  313. if ri := storeSpec.RetrySettings.RetryInterval; ri != nil {
  314. i, err := time.ParseDuration(*storeSpec.RetrySettings.RetryInterval)
  315. if err != nil {
  316. return nil, fmt.Errorf(errOracleClient, err)
  317. }
  318. opts = append(opts, common.WithFixedBackoff(i))
  319. }
  320. return opts, nil
  321. }
  322. func safeConvert(i int32) uint {
  323. if i < 0 {
  324. return 0
  325. }
  326. return uint(i)
  327. }
  328. func (vms *VaultManagementService) getSecretBundleWithCode(ctx context.Context, secretName string) (secrets.GetSecretBundleByNameResponse, int, error) {
  329. // Try to look up the secret, which will determine if we should create or update the secret.
  330. resp, err := vms.Client.GetSecretBundleByName(ctx, secrets.GetSecretBundleByNameRequest{
  331. SecretName: &secretName,
  332. VaultId: &vms.vault,
  333. })
  334. // Get a PushSecret action depending on the ListSecrets response.
  335. action := getSecretBundleCode(err)
  336. return resp, action, err
  337. }
  338. func getSecretBundleCode(err error) int {
  339. if err != nil {
  340. // If we got a 404 service error, try to create the secret.
  341. if serviceErr, ok := err.(common.ServiceError); ok && serviceErr.GetHTTPStatusCode() == 404 {
  342. return SecretNotFound
  343. }
  344. return SecretAPIError
  345. }
  346. // Otherwise, update the existing secret.
  347. return SecretExists
  348. }
  349. func (vms *VaultManagementService) filteredSummaryResult(ctx context.Context, secretSummaries []vault.SecretSummary, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  350. secretMap := map[string][]byte{}
  351. for _, summary := range secretSummaries {
  352. matches, err := matchesRef(summary, ref)
  353. if err != nil {
  354. return nil, err
  355. }
  356. if !matches || summary.TimeOfDeletion != nil {
  357. continue
  358. }
  359. secret, err := vms.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{
  360. Key: *summary.SecretName,
  361. })
  362. if err != nil {
  363. return nil, err
  364. }
  365. secretMap[*summary.SecretName] = secret
  366. }
  367. return secretMap, nil
  368. }
  369. func matchesRef(secretSummary vault.SecretSummary, ref esv1.ExternalSecretFind) (bool, error) {
  370. if ref.Name != nil {
  371. matchString, err := regexp.MatchString(ref.Name.RegExp, *secretSummary.SecretName)
  372. if err != nil {
  373. return false, err
  374. }
  375. return matchString, nil
  376. }
  377. for k, v := range ref.Tags {
  378. if val, ok := secretSummary.FreeformTags[k]; ok {
  379. if val == v {
  380. return true, nil
  381. }
  382. }
  383. }
  384. return false, nil
  385. }
  386. func getSecretData(ctx context.Context, kube kclient.Client, namespace, storeKind string, secretRef esmeta.SecretKeySelector) (string, error) {
  387. if secretRef.Name == "" {
  388. return "", errors.New(errORACLECredSecretName)
  389. }
  390. secret, err := resolvers.SecretKeyRef(
  391. ctx,
  392. kube,
  393. storeKind,
  394. namespace,
  395. &secretRef,
  396. )
  397. if err != nil {
  398. return "", fmt.Errorf(errFetchSAKSecret, err)
  399. }
  400. return secret, nil
  401. }
  402. func getUserAuthConfigurationProvider(ctx context.Context, kube kclient.Client, store *esv1.OracleProvider, namespace, storeKind, region string) (common.ConfigurationProvider, error) {
  403. privateKey, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.PrivateKey)
  404. if err != nil {
  405. return nil, err
  406. }
  407. if privateKey == "" {
  408. return nil, errors.New(errMissingPK)
  409. }
  410. fingerprint, err := getSecretData(ctx, kube, namespace, storeKind, store.Auth.SecretRef.Fingerprint)
  411. if err != nil {
  412. return nil, err
  413. }
  414. if fingerprint == "" {
  415. return nil, errors.New(errMissingFingerprint)
  416. }
  417. if store.Auth.User == "" {
  418. return nil, errors.New(errMissingUser)
  419. }
  420. if store.Auth.Tenancy == "" {
  421. return nil, errors.New(errMissingTenancy)
  422. }
  423. return common.NewRawConfigurationProvider(store.Auth.Tenancy, store.Auth.User, region, fingerprint, privateKey, nil), nil
  424. }
  425. // Close releases any resources used by the VaultManagementService.
  426. func (vms *VaultManagementService) Close(_ context.Context) error {
  427. return nil
  428. }
  429. // Validate performs validation of the Oracle Cloud Infrastructure provider configuration.
  430. func (vms *VaultManagementService) Validate() (esv1.ValidationResult, error) {
  431. _, err := vms.KmsVaultClient.GetVault(
  432. context.Background(), keymanagement.GetVaultRequest{
  433. VaultId: &vms.vault,
  434. },
  435. )
  436. if err != nil {
  437. failure, ok := common.IsServiceError(err)
  438. if ok {
  439. code := failure.GetCode()
  440. switch code {
  441. case "NotAuthenticated":
  442. return esv1.ValidationResultError, sanitizeOCISDKErr(err)
  443. case "NotAuthorizedOrNotFound":
  444. // User authentication was successful, but user might not have a permission like:
  445. //
  446. // Allow group external_secrets to read vaults in tenancy
  447. //
  448. // Which is fine, because to read secrets we only need:
  449. //
  450. // Allow group external_secrets to read secret-family in tenancy
  451. //
  452. // But we can't test for this permission without knowing the name of a secret
  453. return esv1.ValidationResultUnknown, sanitizeOCISDKErr(err)
  454. default:
  455. return esv1.ValidationResultError, sanitizeOCISDKErr(err)
  456. }
  457. } else {
  458. return esv1.ValidationResultError, err
  459. }
  460. }
  461. return esv1.ValidationResultReady, nil
  462. }
  463. // ValidateStore validates the Oracle Cloud Infrastructure SecretStore resource configuration.
  464. func (vms *VaultManagementService) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  465. storeSpec := store.GetSpec()
  466. oracleSpec := storeSpec.Provider.Oracle
  467. vault := oracleSpec.Vault
  468. if vault == "" {
  469. return nil, errors.New("vault cannot be empty")
  470. }
  471. region := oracleSpec.Region
  472. if region == "" {
  473. return nil, errors.New("region cannot be empty")
  474. }
  475. auth := oracleSpec.Auth
  476. if auth == nil {
  477. return nil, nil
  478. }
  479. user := oracleSpec.Auth.User
  480. if user == "" {
  481. return nil, errors.New("user cannot be empty")
  482. }
  483. tenant := oracleSpec.Auth.Tenancy
  484. if tenant == "" {
  485. return nil, errors.New("tenant cannot be empty")
  486. }
  487. privateKey := oracleSpec.Auth.SecretRef.PrivateKey
  488. if privateKey.Name == "" {
  489. return nil, errors.New("privateKey.name cannot be empty")
  490. }
  491. if privateKey.Key == "" {
  492. return nil, errors.New("privateKey.key cannot be empty")
  493. }
  494. err := esutils.ValidateSecretSelector(store, privateKey)
  495. if err != nil {
  496. return nil, err
  497. }
  498. fingerprint := oracleSpec.Auth.SecretRef.Fingerprint
  499. if fingerprint.Name == "" {
  500. return nil, errors.New("fingerprint.name cannot be empty")
  501. }
  502. if fingerprint.Key == "" {
  503. return nil, errors.New("fingerprint.key cannot be empty")
  504. }
  505. err = esutils.ValidateSecretSelector(store, fingerprint)
  506. if err != nil {
  507. return nil, err
  508. }
  509. if oracleSpec.ServiceAccountRef != nil {
  510. if err := esutils.ValidateReferentServiceAccountSelector(store, *oracleSpec.ServiceAccountRef); err != nil {
  511. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  512. }
  513. }
  514. return nil, nil
  515. }
  516. func (vms *VaultManagementService) getWorkloadIdentityProvider(
  517. store esv1.GenericStore,
  518. serviceAcccountRef *esmeta.ServiceAccountSelector,
  519. region, namespace string,
  520. ) (configurationProvider common.ConfigurationProvider, err error) {
  521. defer func() {
  522. if uerr := os.Unsetenv(auth.ResourcePrincipalVersionEnvVar); uerr != nil {
  523. err = errors.Join(err, fmt.Errorf(errSettingOCIEnvVariables, auth.ResourcePrincipalRegionEnvVar, uerr))
  524. }
  525. if uerr := os.Unsetenv(auth.ResourcePrincipalRegionEnvVar); uerr != nil {
  526. err = errors.Join(err, fmt.Errorf("unabled to unset OCI SDK environment variable %s: %w", auth.ResourcePrincipalVersionEnvVar, uerr))
  527. }
  528. vms.workloadIdentityMutex.Unlock()
  529. }()
  530. vms.workloadIdentityMutex.Lock()
  531. // OCI SDK requires specific environment variables for workload identity.
  532. if err := os.Setenv(auth.ResourcePrincipalVersionEnvVar, auth.ResourcePrincipalVersion2_2); err != nil {
  533. return nil, fmt.Errorf(errSettingOCIEnvVariables, auth.ResourcePrincipalVersionEnvVar, err)
  534. }
  535. if err := os.Setenv(auth.ResourcePrincipalRegionEnvVar, region); err != nil {
  536. return nil, fmt.Errorf(errSettingOCIEnvVariables, auth.ResourcePrincipalRegionEnvVar, err)
  537. }
  538. // If no service account is specified, use the pod service account to create the Workload Identity provider.
  539. if serviceAcccountRef == nil {
  540. return auth.OkeWorkloadIdentityConfigurationProvider()
  541. }
  542. // Ensure the service account ref is being used appropriately, so arbitrary tokens are not minted by the provider.
  543. if err = esutils.ValidateServiceAccountSelector(store, *serviceAcccountRef); err != nil {
  544. return nil, fmt.Errorf("invalid ServiceAccountRef: %w", err)
  545. }
  546. cfg, err := ctrlcfg.GetConfig()
  547. if err != nil {
  548. return nil, err
  549. }
  550. clientset, err := kubernetes.NewForConfig(cfg)
  551. if err != nil {
  552. return nil, err
  553. }
  554. tokenProvider := NewTokenProvider(clientset, serviceAcccountRef, namespace)
  555. // Cache OKE token providers per SecretStore to avoid creating multiple providers for the same store.
  556. // We also reset the cache if it exceeds a certain size to avoid unbounded memory growth.
  557. if vms.authConfigurationsCache == nil || len(vms.authConfigurationsCache) >= authConfigurationsCachePoolSize {
  558. vms.authConfigurationsCache = make(map[string]auth.ConfigurationProviderWithClaimAccess)
  559. }
  560. // Caching by resource version to ensure that updates to the SecretStore are reflected in the cached provider.
  561. _, ok := vms.authConfigurationsCache[store.GetResourceVersion()]
  562. if !ok {
  563. vms.authConfigurationsCache[store.GetResourceVersion()], err = auth.OkeWorkloadIdentityConfigurationProviderWithServiceAccountTokenProvider(tokenProvider)
  564. if err != nil {
  565. return nil, err
  566. }
  567. }
  568. return vms.authConfigurationsCache[store.GetResourceVersion()], nil
  569. }
  570. func (vms *VaultManagementService) constructProvider(
  571. ctx context.Context,
  572. store esv1.GenericStore,
  573. oracleSpec *esv1.OracleProvider,
  574. kube kclient.Client,
  575. namespace string,
  576. ) (common.ConfigurationProvider, error) {
  577. var (
  578. configurationProvider common.ConfigurationProvider
  579. err error
  580. )
  581. if oracleSpec.PrincipalType == esv1.WorkloadPrincipal {
  582. configurationProvider, err = vms.getWorkloadIdentityProvider(store, oracleSpec.ServiceAccountRef, oracleSpec.Region, namespace)
  583. } else if oracleSpec.PrincipalType == esv1.InstancePrincipal || oracleSpec.Auth == nil {
  584. configurationProvider, err = auth.InstancePrincipalConfigurationProvider()
  585. } else {
  586. configurationProvider, err = getUserAuthConfigurationProvider(ctx, kube, oracleSpec, namespace, store.GetObjectKind().GroupVersionKind().Kind, oracleSpec.Region)
  587. }
  588. if err != nil {
  589. return nil, fmt.Errorf(errOracleClient, err)
  590. }
  591. return configurationProvider, nil
  592. }
  593. func (vms *VaultManagementService) configureRetryPolicy(
  594. storeSpec *esv1.SecretStoreSpec,
  595. secretManagementService secrets.SecretsClient,
  596. kmsVaultClient keymanagement.KmsVaultClient,
  597. vaultClient vault.VaultsClient,
  598. ) error {
  599. opts, err := vms.constructOptions(storeSpec)
  600. if err != nil {
  601. return err
  602. }
  603. customRetryPolicy := common.NewRetryPolicyWithOptions(opts...)
  604. secretManagementService.SetCustomClientConfiguration(common.CustomClientConfiguration{
  605. RetryPolicy: &customRetryPolicy,
  606. })
  607. kmsVaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  608. RetryPolicy: &customRetryPolicy,
  609. })
  610. vaultClient.SetCustomClientConfiguration(common.CustomClientConfiguration{
  611. RetryPolicy: &customRetryPolicy,
  612. })
  613. return err
  614. }
  615. func sanitizeOCISDKErr(err error) error {
  616. if err == nil {
  617. return nil
  618. }
  619. // If we have a ServiceError from the OCI SDK, strip only the message from the verbose error
  620. if serviceError, ok := err.(common.ServiceErrorRichInfo); ok {
  621. return fmt.Errorf(
  622. "%s service failed to %s, HTTP status code %d: %s",
  623. serviceError.GetTargetService(),
  624. serviceError.GetOperationName(),
  625. serviceError.GetHTTPStatusCode(),
  626. serviceError.GetMessage(),
  627. )
  628. }
  629. return err
  630. }
  631. // NewProvider creates a new Provider instance.
  632. func NewProvider() esv1.Provider {
  633. return &VaultManagementService{}
  634. }
  635. // ProviderSpec returns the provider specification for registration.
  636. func ProviderSpec() *esv1.SecretStoreProvider {
  637. return &esv1.SecretStoreProvider{
  638. Oracle: &esv1.OracleProvider{},
  639. }
  640. }
  641. // MaintenanceStatus returns the maintenance status of the provider.
  642. func MaintenanceStatus() esv1.MaintenanceStatus {
  643. return esv1.MaintenanceStatusMaintained
  644. }