io.camunda.connector.runtime.cloud.GcpSecretManagerSecretProvider Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of connector-gcp-secret-provider Show documentation
Show all versions of connector-gcp-secret-provider Show documentation
Camunda GCP Secret Provider Module
The newest version!
/*
* Copyright Camunda Services GmbH and/or licensed to Camunda Services GmbH
* under one or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information regarding copyright
* ownership. Camunda licenses this file to you under the Apache License,
* Version 2.0; you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.camunda.connector.runtime.cloud;
import com.fasterxml.jackson.core.JsonProcessingException;
import com.fasterxml.jackson.databind.DeserializationFeature;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.fasterxml.jackson.databind.SerializationFeature;
import com.fasterxml.jackson.datatype.jdk8.Jdk8Module;
import com.fasterxml.jackson.datatype.jsr310.JavaTimeModule;
import com.google.cloud.secretmanager.v1.AccessSecretVersionResponse;
import com.google.cloud.secretmanager.v1.SecretManagerServiceClient;
import com.google.cloud.secretmanager.v1.SecretVersionName;
import com.google.common.cache.CacheBuilder;
import com.google.common.cache.CacheLoader;
import com.google.common.cache.LoadingCache;
import io.camunda.connector.api.error.ConnectorException;
import io.camunda.connector.api.secret.SecretProvider;
import java.util.Map;
import java.util.Objects;
import java.util.Optional;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.TimeUnit;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class GcpSecretManagerSecretProvider implements SecretProvider {
private static final Logger LOGGER =
LoggerFactory.getLogger(GcpSecretManagerSecretProvider.class);
private static final ObjectMapper DEFAULT_MAPPER =
new ObjectMapper()
.registerModule(new Jdk8Module())
.registerModule(new JavaTimeModule())
.disable(SerializationFeature.FAIL_ON_EMPTY_BEANS)
.disable(DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES);
/** Secrets used as fallback if SecretProvider is loaded via SPI */
public static final String SECRETS_PROJECT_ENV_NAME = "SECRETS_PROJECT_ID";
public static final String SECRETS_PREFIX_ENV_NAME = "SECRETS_PREFIX";
public static final String CLUSTER_ID_ENV_NAME = "CAMUNDA_CLUSTER_ID";
public static final String SECRETS_CACHE_MILLIS_ENV_NAME =
"CAMUNDA_CONNECTOR_SECRETS_CACHE_MILLIS";
// private final Gson gson;
private ObjectMapper mapper;
private final String clusterId;
private final String secretsProjectId;
private final String secretsNamePrefix;
// private Map secrets = new HashMap<>();
private static final String CACHE_KEY = "SECRETS";
LoadingCache> secretsCache;
public GcpSecretManagerSecretProvider() {
this(
System.getenv(CLUSTER_ID_ENV_NAME),
System.getenv(SECRETS_PROJECT_ENV_NAME),
System.getenv(SECRETS_PREFIX_ENV_NAME));
}
public GcpSecretManagerSecretProvider(
String clusterId, String secretsProjectId, String secretsNamePrefix) {
this(DEFAULT_MAPPER, clusterId, secretsProjectId, secretsNamePrefix);
}
public GcpSecretManagerSecretProvider(
ObjectMapper mapper, String clusterId, String secretsProjectId, String secretsNamePrefix) {
this.mapper = mapper;
this.clusterId = clusterId;
this.secretsProjectId =
Objects.requireNonNull(secretsProjectId, "Configuration for Secrets project id is missing");
this.secretsNamePrefix =
Objects.requireNonNull(
secretsNamePrefix, "Configuration for Secrets name prefix is missing");
this.setupSecretsCache();
}
public void setupSecretsCache() {
// Load secrets via this loader function whenever necessary
CacheLoader> loader =
new CacheLoader<>() {
@Override
public Map load(String key) throws JsonProcessingException {
return unwrapSecrets(loadGoogleSecrets(clusterId));
}
};
long millis =
Long.parseLong(
Optional.ofNullable(System.getenv(SECRETS_CACHE_MILLIS_ENV_NAME))
.orElseGet(() -> "5000"));
secretsCache =
CacheBuilder.newBuilder().refreshAfterWrite(millis, TimeUnit.MILLISECONDS).build(loader);
}
protected Map unwrapSecrets(final String secretsAsJson)
throws JsonProcessingException {
return mapper.readValue(secretsAsJson, Map.class);
}
protected String loadGoogleSecrets(final String clusterId) {
Objects.requireNonNull(clusterId, "You need to specify the clusterId to load secrets for");
LOGGER.info("Fetching secrets for cluster {} from secret manager", clusterId);
try (final SecretManagerServiceClient client = SecretManagerServiceClient.create()) {
final String secretName = String.format("%s-%s", secretsNamePrefix, clusterId);
final SecretVersionName secretVersionName =
SecretVersionName.of(secretsProjectId, secretName, "latest");
final AccessSecretVersionResponse response = client.accessSecretVersion(secretVersionName);
return response.getPayload().getData().toStringUtf8();
} catch (final Exception e) {
LOGGER.trace("Failed to load secrets from secret manager", e);
throw new RuntimeException("Failed to load secrets from secret manager", e);
}
}
@Override
public String getSecret(String name) {
try {
return secretsCache.get(CACHE_KEY).get(name);
} catch (ExecutionException e) {
throw new ConnectorException("Could not resolve secrets: " + e.getMessage(), e);
}
}
}