1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00
external-secrets/pkg/utils/utils.go
Gergely Brautigam 82d419e2ee
feat: add CAProvider to Bitwarden provider (#3699)
* feat: add CAProvider to bitwarden

This change introduces a refactor as well since CAProvider
was used by multiple providers with diverging implementations.
The following providers were affected:
- webhook
- akeyless
- vault
- conjur
- kubernetes

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* refactored the Kubernetes provider to use create ca

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* refactor webhook, vault and kubernetes provider

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* rename CreateCACert to FetchCACertFromSource

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* addressed comments and autodecoding base64 data

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

* check if the decoded value is a valid certificate

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

---------

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>
2024-08-16 12:32:35 +02:00

643 lines
17 KiB
Go

/*
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package utils
import (
"bytes"
"context"
"crypto/md5" //nolint:gosec
"crypto/x509"
"encoding/base64"
"encoding/json"
"encoding/pem"
"errors"
"fmt"
"net"
"net/url"
"reflect"
"regexp"
"strconv"
"strings"
tpl "text/template"
"time"
"unicode"
corev1 "k8s.io/api/core/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
"github.com/external-secrets/external-secrets/pkg/template/v2"
"github.com/external-secrets/external-secrets/pkg/utils/resolvers"
)
const (
errParse = "unable to parse transform template: %s"
errExecute = "unable to execute transform template: %s"
)
var (
errKeyNotFound = errors.New("key not found")
unicodeRegex = regexp.MustCompile(`_U([0-9a-fA-F]{4,5})_`)
)
// JSONMarshal takes an interface and returns a new escaped and encoded byte slice.
func JSONMarshal(t any) ([]byte, error) {
buffer := &bytes.Buffer{}
encoder := json.NewEncoder(buffer)
encoder.SetEscapeHTML(false)
err := encoder.Encode(t)
return bytes.TrimRight(buffer.Bytes(), "\n"), err
}
// MergeByteMap merges map of byte slices.
func MergeByteMap(dst, src map[string][]byte) map[string][]byte {
for k, v := range src {
dst[k] = v
}
return dst
}
func RewriteMap(operations []esv1beta1.ExternalSecretRewrite, in map[string][]byte) (map[string][]byte, error) {
out := in
var err error
for i, op := range operations {
if op.Regexp != nil {
out, err = RewriteRegexp(*op.Regexp, out)
if err != nil {
return nil, fmt.Errorf("failed rewriting regexp operation[%v]: %w", i, err)
}
}
if op.Transform != nil {
out, err = RewriteTransform(*op.Transform, out)
if err != nil {
return nil, fmt.Errorf("failed rewriting transform operation[%v]: %w", i, err)
}
}
}
return out, nil
}
// RewriteRegexp rewrites a single Regexp Rewrite Operation.
func RewriteRegexp(operation esv1beta1.ExternalSecretRewriteRegexp, in map[string][]byte) (map[string][]byte, error) {
out := make(map[string][]byte)
re, err := regexp.Compile(operation.Source)
if err != nil {
return nil, err
}
for key, value := range in {
newKey := re.ReplaceAllString(key, operation.Target)
out[newKey] = value
}
return out, nil
}
// RewriteTransform applies string transformation on each secret key name to rewrite.
func RewriteTransform(operation esv1beta1.ExternalSecretRewriteTransform, in map[string][]byte) (map[string][]byte, error) {
out := make(map[string][]byte)
for key, value := range in {
data := map[string][]byte{
"value": []byte(key),
}
result, err := transform(operation.Template, data)
if err != nil {
return nil, err
}
newKey := string(result)
out[newKey] = value
}
return out, nil
}
func transform(val string, data map[string][]byte) ([]byte, error) {
strValData := make(map[string]string, len(data))
for k := range data {
strValData[k] = string(data[k])
}
t, err := tpl.New("transform").
Funcs(template.FuncMap()).
Parse(val)
if err != nil {
return nil, fmt.Errorf(errParse, err)
}
buf := bytes.NewBuffer(nil)
err = t.Execute(buf, strValData)
if err != nil {
return nil, fmt.Errorf(errExecute, err)
}
return buf.Bytes(), nil
}
// DecodeMap decodes values from a secretMap.
func DecodeMap(strategy esv1beta1.ExternalSecretDecodingStrategy, in map[string][]byte) (map[string][]byte, error) {
out := make(map[string][]byte, len(in))
for k, v := range in {
val, err := Decode(strategy, v)
if err != nil {
return nil, fmt.Errorf("failure decoding key %v: %w", k, err)
}
out[k] = val
}
return out, nil
}
func Decode(strategy esv1beta1.ExternalSecretDecodingStrategy, in []byte) ([]byte, error) {
switch strategy {
case esv1beta1.ExternalSecretDecodeBase64:
out, err := base64.StdEncoding.DecodeString(string(in))
if err != nil {
return nil, err
}
return out, nil
case esv1beta1.ExternalSecretDecodeBase64URL:
out, err := base64.URLEncoding.DecodeString(string(in))
if err != nil {
return nil, err
}
return out, nil
case esv1beta1.ExternalSecretDecodeNone:
return in, nil
// default when stored version is v1alpha1
case "":
return in, nil
case esv1beta1.ExternalSecretDecodeAuto:
out, err := Decode(esv1beta1.ExternalSecretDecodeBase64, in)
if err != nil {
out, err := Decode(esv1beta1.ExternalSecretDecodeBase64URL, in)
if err != nil {
return Decode(esv1beta1.ExternalSecretDecodeNone, in)
}
return out, nil
}
return out, nil
default:
return nil, fmt.Errorf("decoding strategy %v is not supported", strategy)
}
}
func ValidateKeys(in map[string][]byte) bool {
for key := range in {
for _, v := range key {
if !unicode.IsNumber(v) &&
!unicode.IsLetter(v) &&
v != '-' &&
v != '.' &&
v != '_' {
return false
}
}
}
return true
}
// ConvertKeys converts a secret map into a valid key.
// Replaces any non-alphanumeric characters depending on convert strategy.
func ConvertKeys(strategy esv1beta1.ExternalSecretConversionStrategy, in map[string][]byte) (map[string][]byte, error) {
out := make(map[string][]byte, len(in))
for k, v := range in {
key := convert(strategy, k)
if _, exists := out[key]; exists {
return nil, fmt.Errorf("secret name collision during conversion: %s", key)
}
out[key] = v
}
return out, nil
}
func convert(strategy esv1beta1.ExternalSecretConversionStrategy, str string) string {
rs := []rune(str)
newName := make([]string, len(rs))
for rk, rv := range rs {
if !unicode.IsNumber(rv) &&
!unicode.IsLetter(rv) &&
rv != '-' &&
rv != '.' &&
rv != '_' {
switch strategy {
case esv1beta1.ExternalSecretConversionDefault:
newName[rk] = "_"
case esv1beta1.ExternalSecretConversionUnicode:
newName[rk] = fmt.Sprintf("_U%04x_", rv)
default:
newName[rk] = string(rv)
}
} else {
newName[rk] = string(rv)
}
}
return strings.Join(newName, "")
}
// ReverseKeys reverses a secret map into a valid key map as expected by push secrets.
// Replaces the unicode encoded representation characters back to the actual unicode character depending on convert strategy.
func ReverseKeys(strategy esv1alpha1.PushSecretConversionStrategy, in map[string][]byte) (map[string][]byte, error) {
out := make(map[string][]byte, len(in))
for k, v := range in {
key := reverse(strategy, k)
if _, exists := out[key]; exists {
return nil, fmt.Errorf("secret name collision during conversion: %s", key)
}
out[key] = v
}
return out, nil
}
func reverse(strategy esv1alpha1.PushSecretConversionStrategy, str string) string {
switch strategy {
case esv1alpha1.PushSecretConversionReverseUnicode:
matches := unicodeRegex.FindAllStringSubmatchIndex(str, -1)
for i := len(matches) - 1; i >= 0; i-- {
match := matches[i]
start := match[0]
end := match[1]
unicodeHex := str[match[2]:match[3]]
unicodeInt, err := strconv.ParseInt(unicodeHex, 16, 32)
if err != nil {
continue // Skip invalid unicode representations
}
unicodeChar := fmt.Sprintf("%c", unicodeInt)
str = str[:start] + unicodeChar + str[end:]
}
return str
case esv1alpha1.PushSecretConversionNone:
return str
default:
return str
}
}
// MergeStringMap performs a deep clone from src to dest.
func MergeStringMap(dest, src map[string]string) {
for k, v := range src {
dest[k] = v
}
}
var (
ErrUnexpectedKey = errors.New("unexpected key in data")
ErrSecretType = errors.New("can not handle secret value with type")
)
func GetByteValueFromMap(data map[string]any, key string) ([]byte, error) {
v, ok := data[key]
if !ok {
return nil, fmt.Errorf("%w: %s", ErrUnexpectedKey, key)
}
return GetByteValue(v)
}
func GetByteValue(v any) ([]byte, error) {
switch t := v.(type) {
case string:
return []byte(t), nil
case map[string]any:
return json.Marshal(t)
case []string:
return []byte(strings.Join(t, "\n")), nil
case json.RawMessage:
return t, nil
case []byte:
return t, nil
// also covers int and float32 due to json.Marshal
case float64:
return []byte(strconv.FormatFloat(t, 'f', -1, 64)), nil
case json.Number:
return []byte(t.String()), nil
case []any:
return json.Marshal(t)
case bool:
return []byte(strconv.FormatBool(t)), nil
case nil:
return []byte(nil), nil
default:
return nil, fmt.Errorf("%w: %T", ErrSecretType, t)
}
}
// IsNil checks if an Interface is nil.
func IsNil(i any) bool {
if i == nil {
return true
}
value := reflect.ValueOf(i)
if value.Type().Kind() == reflect.Ptr {
return value.IsNil()
}
return false
}
// ObjectHash calculates md5 sum of the data contained in the secret.
//
//nolint:gosec
func ObjectHash(object any) string {
textualVersion := fmt.Sprintf("%+v", object)
return fmt.Sprintf("%x", md5.Sum([]byte(textualVersion)))
}
func ErrorContains(out error, want string) bool {
if out == nil {
return want == ""
}
if want == "" {
return false
}
return strings.Contains(out.Error(), want)
}
var (
errNamespaceNotAllowed = errors.New("namespace should either be empty or match the namespace of the SecretStore for a namespaced SecretStore")
errRequireNamespace = errors.New("cluster scope requires namespace")
)
// ValidateSecretSelector just checks if the namespace field is present/absent
// depending on the secret store type.
// We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
func ValidateSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
if clusterScope && ref.Namespace == nil {
return errRequireNamespace
}
if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
return errNamespaceNotAllowed
}
return nil
}
// ValidateReferentSecretSelector allows
// cluster scoped store without namespace
// this should replace above ValidateServiceAccountSelector once all providers
// support referent auth.
func ValidateReferentSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
return errNamespaceNotAllowed
}
return nil
}
// ValidateServiceAccountSelector just checks if the namespace field is present/absent
// depending on the secret store type.
// We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
func ValidateServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
if clusterScope && ref.Namespace == nil {
return errRequireNamespace
}
if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
return errNamespaceNotAllowed
}
return nil
}
// ValidateReferentServiceAccountSelector allows
// cluster scoped store without namespace
// this should replace above ValidateServiceAccountSelector once all providers
// support referent auth.
func ValidateReferentServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
return errNamespaceNotAllowed
}
return nil
}
func NetworkValidate(endpoint string, timeout time.Duration) error {
hostname, err := url.Parse(endpoint)
if err != nil {
return fmt.Errorf("could not parse url: %w", err)
}
host := hostname.Hostname()
port := hostname.Port()
if port == "" {
port = "443"
}
url := fmt.Sprintf("%v:%v", host, port)
conn, err := net.DialTimeout("tcp", url, timeout)
if err != nil {
return fmt.Errorf("error accessing external store: %w", err)
}
defer conn.Close()
return nil
}
func Deref[V any](v *V) V {
if v == nil {
// Create zero value
var res V
return res
}
return *v
}
func Ptr[T any](i T) *T {
return &i
}
func ConvertToType[T any](obj any) (T, error) {
var v T
data, err := json.Marshal(obj)
if err != nil {
return v, fmt.Errorf("failed to marshal object: %w", err)
}
if err = json.Unmarshal(data, &v); err != nil {
return v, fmt.Errorf("failed to unmarshal object: %w", err)
}
return v, nil
}
// FetchValueFromMetadata fetches a key from a metadata if it exists. It will recursively look in
// embedded values as well. Must be a unique key, otherwise it will just return the first
// occurrence.
func FetchValueFromMetadata[T any](key string, data *apiextensionsv1.JSON, def T) (t T, _ error) {
if data == nil {
return def, nil
}
m := map[string]any{}
if err := json.Unmarshal(data.Raw, &m); err != nil {
return t, fmt.Errorf("failed to parse JSON raw data: %w", err)
}
v, err := dig[T](key, m)
if err != nil {
if errors.Is(err, errKeyNotFound) {
return def, nil
}
}
return v, nil
}
func dig[T any](key string, data map[string]any) (t T, _ error) {
if v, ok := data[key]; ok {
c, k := v.(T)
if !k {
return t, fmt.Errorf("failed to convert value to the desired type; was: %T", v)
}
return c, nil
}
for _, v := range data {
if ty, ok := v.(map[string]any); ok {
return dig[T](key, ty)
}
}
return t, errKeyNotFound
}
func CompareStringAndByteSlices(valueString *string, valueByte []byte) bool {
if valueString == nil {
return false
}
return bytes.Equal(valueByte, []byte(*valueString))
}
// CreateCertOpts contains options for a cert pool creation.
type CreateCertOpts struct {
CABundle []byte
CAProvider *esv1beta1.CAProvider
StoreKind string
Namespace string
Client client.Client
}
// FetchCACertFromSource creates a CertPool using either a CABundle directly, or
// a ConfigMap / Secret.
func FetchCACertFromSource(ctx context.Context, opts CreateCertOpts) ([]byte, error) {
if len(opts.CABundle) == 0 && opts.CAProvider == nil {
return nil, nil
}
if len(opts.CABundle) > 0 {
pem, err := base64decode(opts.CABundle)
if err != nil {
return nil, fmt.Errorf("failed to decode ca bundle: %w", err)
}
return pem, nil
}
if opts.CAProvider != nil &&
opts.StoreKind == esv1beta1.ClusterSecretStoreKind &&
opts.CAProvider.Namespace == nil {
return nil, fmt.Errorf("missing namespace on caProvider secret")
}
switch opts.CAProvider.Type {
case esv1beta1.CAProviderTypeSecret:
cert, err := getCertFromSecret(ctx, opts.Client, opts.CAProvider, opts.StoreKind, opts.Namespace)
if err != nil {
return nil, fmt.Errorf("failed to get cert from secret: %w", err)
}
return cert, nil
case esv1beta1.CAProviderTypeConfigMap:
cert, err := getCertFromConfigMap(ctx, opts.Namespace, opts.Client, opts.CAProvider)
if err != nil {
return nil, fmt.Errorf("failed to get cert from configmap: %w", err)
}
return cert, nil
}
return nil, fmt.Errorf("unsupported CA provider type: %s", opts.CAProvider.Type)
}
func base64decode(cert []byte) ([]byte, error) {
if c, err := parseCertificateBytes(cert); err == nil {
return c, nil
}
// try decoding and test for validity again...
certificate, err := Decode(esv1beta1.ExternalSecretDecodeAuto, cert)
if err != nil {
return nil, fmt.Errorf("failed to decode base64: %w", err)
}
return parseCertificateBytes(certificate)
}
func parseCertificateBytes(certBytes []byte) ([]byte, error) {
block, _ := pem.Decode(certBytes)
if block == nil {
return nil, errors.New("failed to parse the new certificate, not valid pem data")
}
if _, err := x509.ParseCertificate(block.Bytes); err != nil {
return nil, fmt.Errorf("failed to validate certificate: %w", err)
}
return certBytes, nil
}
func getCertFromSecret(ctx context.Context, c client.Client, provider *esv1beta1.CAProvider, storeKind, namespace string) ([]byte, error) {
secretRef := esmeta.SecretKeySelector{
Name: provider.Name,
Key: provider.Key,
}
if provider.Namespace != nil {
secretRef.Namespace = provider.Namespace
}
cert, err := resolvers.SecretKeyRef(ctx, c, storeKind, namespace, &secretRef)
if err != nil {
return nil, fmt.Errorf("failed to resolve secret key ref: %w", err)
}
return []byte(cert), nil
}
func getCertFromConfigMap(ctx context.Context, namespace string, c client.Client, provider *esv1beta1.CAProvider) ([]byte, error) {
objKey := client.ObjectKey{
Name: provider.Name,
Namespace: namespace,
}
if provider.Namespace != nil {
objKey.Namespace = *provider.Namespace
}
configMapRef := &corev1.ConfigMap{}
err := c.Get(ctx, objKey, configMapRef)
if err != nil {
return nil, fmt.Errorf("failed to get caProvider secret %s: %w", objKey.Name, err)
}
val, ok := configMapRef.Data[provider.Key]
if !ok {
return nil, fmt.Errorf("failed to get caProvider configMap %s -> %s", objKey.Name, provider.Key)
}
return []byte(val), nil
}