akeyless.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package akeyless provides integration with Akeyless Vault for secrets management.
  14. package akeyless
  15. import (
  16. "bytes"
  17. "context"
  18. "crypto/tls"
  19. "crypto/x509"
  20. "encoding/json"
  21. "errors"
  22. "fmt"
  23. "net/http"
  24. "net/url"
  25. "slices"
  26. "strconv"
  27. "strings"
  28. "time"
  29. "github.com/akeylesslabs/akeyless-go/v4"
  30. "github.com/tidwall/gjson"
  31. corev1 "k8s.io/api/core/v1"
  32. "k8s.io/client-go/kubernetes"
  33. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  34. "sigs.k8s.io/controller-runtime/pkg/client"
  35. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  36. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  37. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  38. "github.com/external-secrets/external-secrets/pkg/esutils"
  39. "github.com/external-secrets/external-secrets/pkg/find"
  40. )
  41. // Ctx is a type used for context keys in Akeyless provider implementations.
  42. type Ctx string
  43. const (
  44. defaultAPIUrl = "https://api.akeyless.io"
  45. extSecretManagedTag = "k8s-external-secrets"
  46. aKeylessToken Ctx = "AKEYLESS_TOKEN"
  47. )
  48. // https://github.com/external-secrets/external-secrets/issues/644
  49. var _ esv1.SecretsClient = &Akeyless{}
  50. var _ esv1.Provider = &Provider{}
  51. // Provider satisfies the provider interface.
  52. type Provider struct{}
  53. // akeylessBase satisfies the provider.SecretsClient interface.
  54. type akeylessBase struct {
  55. kube client.Client
  56. store esv1.GenericStore
  57. storeKind string
  58. corev1 typedcorev1.CoreV1Interface
  59. namespace string
  60. akeylessGwAPIURL string
  61. RestAPI *akeyless.V2ApiService
  62. }
  63. // Akeyless represents a client for the Akeyless Vault service.
  64. type Akeyless struct {
  65. Client akeylessVaultInterface
  66. url string
  67. }
  68. // Item represents an item in the Akeyless Vault.
  69. type Item struct {
  70. ItemName string `json:"item_name"`
  71. ItemType string `json:"item_type"`
  72. LastVersion int32 `json:"last_version"`
  73. }
  74. type akeylessVaultInterface interface {
  75. GetSecretByType(ctx context.Context, secretName string, version int32) (string, error)
  76. TokenFromSecretRef(ctx context.Context) (string, error)
  77. ListSecrets(ctx context.Context, path, tag string) ([]string, error)
  78. DescribeItem(ctx context.Context, itemName string) (*akeyless.Item, error)
  79. CreateSecret(ctx context.Context, remoteKey, data string) error
  80. UpdateSecret(ctx context.Context, remoteKey, data string) error
  81. DeleteSecret(ctx context.Context, remoteKey string) error
  82. }
  83. func init() {
  84. esv1.Register(&Provider{}, &esv1.SecretStoreProvider{
  85. Akeyless: &esv1.AkeylessProvider{},
  86. }, esv1.MaintenanceStatusMaintained)
  87. }
  88. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  89. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  90. return esv1.SecretStoreReadOnly
  91. }
  92. // NewClient constructs a new secrets client based on the provided store.
  93. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string) (esv1.SecretsClient, error) {
  94. // controller-runtime/client does not support TokenRequest or other subresource APIs
  95. // so we need to construct our own client and use it to fetch tokens
  96. // (for Kubernetes service account token auth)
  97. restCfg, err := ctrlcfg.GetConfig()
  98. if err != nil {
  99. return nil, err
  100. }
  101. clientset, err := kubernetes.NewForConfig(restCfg)
  102. if err != nil {
  103. return nil, err
  104. }
  105. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  106. }
  107. // ValidateStore validates the configuration of the Akeyless provider in the store.
  108. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  109. storeSpec := store.GetSpec()
  110. akeylessSpec := storeSpec.Provider.Akeyless
  111. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  112. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  113. parsedURL, err := url.Parse(*akeylessGWApiURL)
  114. if err != nil {
  115. return nil, errors.New(errInvalidAkeylessURL)
  116. }
  117. if parsedURL.Host == "" {
  118. return nil, errors.New(errInvalidAkeylessURL)
  119. }
  120. }
  121. if akeylessSpec.Auth.KubernetesAuth != nil {
  122. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  123. if err := esutils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  124. return nil, fmt.Errorf(errInvalidKubeSA, err)
  125. }
  126. }
  127. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  128. err := esutils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  129. if err != nil {
  130. return nil, err
  131. }
  132. }
  133. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  134. return nil, errors.New("missing kubernetes auth-method access-id")
  135. }
  136. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  137. return nil, errors.New("missing kubernetes config name")
  138. }
  139. return nil, nil
  140. }
  141. accessID := akeylessSpec.Auth.SecretRef.AccessID
  142. err := esutils.ValidateSecretSelector(store, accessID)
  143. if err != nil {
  144. return nil, err
  145. }
  146. if accessID.Name == "" {
  147. return nil, errors.New(errInvalidAkeylessAccessIDName)
  148. }
  149. if accessID.Key == "" {
  150. return nil, errors.New(errInvalidAkeylessAccessIDKey)
  151. }
  152. accessType := akeylessSpec.Auth.SecretRef.AccessType
  153. err = esutils.ValidateSecretSelector(store, accessType)
  154. if err != nil {
  155. return nil, err
  156. }
  157. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  158. err = esutils.ValidateSecretSelector(store, accessTypeParam)
  159. if err != nil {
  160. return nil, err
  161. }
  162. return nil, nil
  163. }
  164. func newClient(ctx context.Context, store esv1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  165. akl := &akeylessBase{
  166. kube: kube,
  167. store: store,
  168. namespace: namespace,
  169. corev1: corev1,
  170. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  171. }
  172. spec, err := GetAKeylessProvider(store)
  173. if err != nil {
  174. return nil, err
  175. }
  176. akeylessGwAPIURL := defaultAPIUrl
  177. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  178. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  179. }
  180. if spec.Auth == nil {
  181. return nil, errors.New("missing Auth in store config")
  182. }
  183. client, err := akl.getAkeylessHTTPClient(ctx, spec)
  184. if err != nil {
  185. return nil, err
  186. }
  187. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  188. HTTPClient: client,
  189. Servers: []akeyless.ServerConfiguration{
  190. {
  191. URL: akeylessGwAPIURL,
  192. },
  193. },
  194. }).V2Api
  195. akl.akeylessGwAPIURL = akeylessGwAPIURL
  196. akl.RestAPI = RestAPIClient
  197. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  198. }
  199. func (a *Akeyless) contextWithToken(ctx context.Context) (context.Context, error) {
  200. if v := ctx.Value(aKeylessToken); v != nil {
  201. return ctx, nil
  202. }
  203. token, err := a.Client.TokenFromSecretRef(ctx)
  204. if err != nil {
  205. return nil, err
  206. }
  207. return context.WithValue(ctx, aKeylessToken, token), nil
  208. }
  209. // Close closes the Akeyless client connection.
  210. func (a *Akeyless) Close(_ context.Context) error {
  211. return nil
  212. }
  213. // Validate validates the Akeyless connection by testing network connectivity.
  214. func (a *Akeyless) Validate() (esv1.ValidationResult, error) {
  215. timeout := 15 * time.Second
  216. serviceURL := a.url
  217. if err := esutils.NetworkValidate(serviceURL, timeout); err != nil {
  218. return esv1.ValidationResultError, err
  219. }
  220. return esv1.ValidationResultReady, nil
  221. }
  222. // GetSecret retrieves a secret with the secret name defined in ref.Name.
  223. // Implements store.Client.GetSecret Interface.
  224. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  225. if esutils.IsNil(a.Client) {
  226. return nil, errors.New(errUninitalizedAkeylessProvider)
  227. }
  228. ctx, err := a.contextWithToken(ctx)
  229. if err != nil {
  230. return nil, err
  231. }
  232. version := int32(0)
  233. if ref.Version != "" {
  234. i, err := strconv.ParseInt(ref.Version, 10, 32)
  235. if err == nil {
  236. version = int32(i)
  237. }
  238. }
  239. value, err := a.Client.GetSecretByType(ctx, ref.Key, version)
  240. if err != nil {
  241. return nil, err
  242. }
  243. if ref.Property == "" {
  244. if value != "" {
  245. return []byte(value), nil
  246. }
  247. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  248. }
  249. // We need to search if a given key with a . exists before using gjson operations.
  250. idx := strings.Index(ref.Property, ".")
  251. if idx > -1 {
  252. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  253. val := gjson.Get(value, refProperty)
  254. if val.Exists() {
  255. return []byte(val.String()), nil
  256. }
  257. }
  258. val := gjson.Get(value, ref.Property)
  259. if !val.Exists() {
  260. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  261. }
  262. return []byte(val.String()), nil
  263. }
  264. // GetAllSecrets Implements store.Client.GetAllSecrets Interface.
  265. // Retrieves all secrets with defined in ref.Name or tags.
  266. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  267. if esutils.IsNil(a.Client) {
  268. return nil, errors.New(errUninitalizedAkeylessProvider)
  269. }
  270. ctx, err := a.contextWithToken(ctx)
  271. if err != nil {
  272. return nil, err
  273. }
  274. searchPath := ""
  275. if ref.Path != nil {
  276. searchPath = *ref.Path
  277. if !strings.HasPrefix(searchPath, "/") {
  278. searchPath = "/" + searchPath
  279. }
  280. if !strings.HasSuffix(searchPath, "/") {
  281. searchPath += "/"
  282. }
  283. }
  284. if ref.Name != nil {
  285. return a.findSecretsFromName(ctx, searchPath, *ref.Name)
  286. }
  287. if len(ref.Tags) > 0 {
  288. return a.getSecrets(ctx, searchPath, ref.Tags)
  289. }
  290. return nil, errors.New("unexpected find operator")
  291. }
  292. func (a *Akeyless) getSecrets(ctx context.Context, searchPath string, tags map[string]string) (map[string][]byte, error) {
  293. var potentialSecretsName []string
  294. for _, v := range tags {
  295. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v)
  296. if err != nil {
  297. return nil, err
  298. }
  299. if len(potentialSecrets) > 0 {
  300. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  301. }
  302. }
  303. if len(potentialSecretsName) == 0 {
  304. return nil, nil
  305. }
  306. secrets := make(map[string][]byte)
  307. for _, name := range potentialSecretsName {
  308. secretValue, err := a.Client.GetSecretByType(ctx, name, 0)
  309. if err != nil {
  310. return nil, err
  311. }
  312. if secretValue != "" {
  313. secrets[name] = []byte(secretValue)
  314. }
  315. }
  316. return secrets, nil
  317. }
  318. func (a *Akeyless) findSecretsFromName(ctx context.Context, searchPath string, ref esv1.FindName) (map[string][]byte, error) {
  319. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "")
  320. if err != nil {
  321. return nil, err
  322. }
  323. if len(potentialSecrets) == 0 {
  324. return nil, nil
  325. }
  326. secrets := make(map[string][]byte)
  327. matcher, err := find.New(ref)
  328. if err != nil {
  329. return nil, err
  330. }
  331. for _, name := range potentialSecrets {
  332. ok := matcher.MatchName(name)
  333. if ok {
  334. secretValue, err := a.Client.GetSecretByType(ctx, name, 0)
  335. if err != nil {
  336. return nil, err
  337. }
  338. if secretValue != "" {
  339. secrets[name] = []byte(secretValue)
  340. }
  341. }
  342. }
  343. return secrets, nil
  344. }
  345. // GetSecretMap implements store.Client.GetSecretMap Interface.
  346. // New version of GetSecretMap.
  347. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  348. if esutils.IsNil(a.Client) {
  349. return nil, errors.New(errUninitalizedAkeylessProvider)
  350. }
  351. val, err := a.GetSecret(ctx, ref)
  352. if err != nil {
  353. return nil, err
  354. }
  355. // Maps the json data to a string:string map
  356. kv := make(map[string]string)
  357. err = json.Unmarshal(val, &kv)
  358. if err != nil {
  359. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  360. }
  361. // Converts values in K:V pairs into bytes, while leaving keys as strings
  362. secretData := make(map[string][]byte)
  363. for k, v := range kv {
  364. secretData[k] = []byte(v)
  365. }
  366. return secretData, nil
  367. }
  368. // SecretExists checks if a secret exists in Akeyless Vault at the specified remote reference.
  369. func (a *Akeyless) SecretExists(ctx context.Context, ref esv1.PushSecretRemoteRef) (bool, error) {
  370. if esutils.IsNil(a.Client) {
  371. return false, errors.New(errUninitalizedAkeylessProvider)
  372. }
  373. secret, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: ref.GetRemoteKey()})
  374. if errors.Is(err, ErrItemNotExists) {
  375. return false, nil
  376. }
  377. if err != nil {
  378. return false, err
  379. }
  380. if ref.GetProperty() == "" {
  381. return true, nil
  382. }
  383. var secretMap map[string]any
  384. err = json.Unmarshal(secret, &secretMap)
  385. if err != nil {
  386. return false, err
  387. }
  388. _, ok := secretMap[ref.GetProperty()]
  389. return ok, nil
  390. }
  391. func initMapIfNotExist(psd esv1.PushSecretData, secretMapSize int) map[string]any {
  392. mapSize := 1
  393. if psd.GetProperty() == "" {
  394. mapSize = secretMapSize
  395. }
  396. return make(map[string]any, mapSize)
  397. }
  398. // PushSecret pushes a Kubernetes secret to Akeyless Vault using the provided data.
  399. func (a *Akeyless) PushSecret(ctx context.Context, secret *corev1.Secret, psd esv1.PushSecretData) error {
  400. if esutils.IsNil(a.Client) {
  401. return errors.New(errUninitalizedAkeylessProvider)
  402. }
  403. ctx, err := a.contextWithToken(ctx)
  404. if err != nil {
  405. return err
  406. }
  407. secretRemote, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: psd.GetRemoteKey()})
  408. isNotExists := errors.Is(err, ErrItemNotExists)
  409. if err != nil && !isNotExists {
  410. return err
  411. }
  412. var data map[string]any
  413. if isNotExists {
  414. data = initMapIfNotExist(psd, len(secret.Data))
  415. err = nil
  416. } else {
  417. err = json.Unmarshal(secretRemote, &data)
  418. }
  419. if err != nil {
  420. return err
  421. }
  422. if psd.GetProperty() == "" {
  423. for k, v := range secret.Data {
  424. data[k] = string(v)
  425. }
  426. } else if v, ok := secret.Data[psd.GetSecretKey()]; ok {
  427. data[psd.GetProperty()] = string(v)
  428. }
  429. dataByte, err := json.Marshal(data)
  430. if err != nil {
  431. return err
  432. }
  433. if bytes.Equal(dataByte, secretRemote) {
  434. return nil
  435. }
  436. if isNotExists {
  437. return a.Client.CreateSecret(ctx, psd.GetRemoteKey(), string(dataByte))
  438. }
  439. return a.Client.UpdateSecret(ctx, psd.GetRemoteKey(), string(dataByte))
  440. }
  441. // DeleteSecret deletes a secret from Akeyless Vault at the specified remote reference.
  442. func (a *Akeyless) DeleteSecret(ctx context.Context, psr esv1.PushSecretRemoteRef) error {
  443. if esutils.IsNil(a.Client) {
  444. return errors.New(errUninitalizedAkeylessProvider)
  445. }
  446. ctx, err := a.contextWithToken(ctx)
  447. if err != nil {
  448. return err
  449. }
  450. item, err := a.Client.DescribeItem(ctx, psr.GetRemoteKey())
  451. if err != nil {
  452. return err
  453. }
  454. if item == nil || item.ItemTags == nil || !slices.Contains(*item.ItemTags, extSecretManagedTag) {
  455. return nil
  456. }
  457. if psr.GetProperty() == "" {
  458. err = a.Client.DeleteSecret(ctx, psr.GetRemoteKey())
  459. return err
  460. }
  461. secret, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: psr.GetRemoteKey()})
  462. if err != nil {
  463. return err
  464. }
  465. var secretMap map[string]any
  466. err = json.Unmarshal(secret, &secretMap)
  467. if err != nil {
  468. return err
  469. }
  470. delete(secretMap, psr.GetProperty())
  471. if len(secretMap) == 0 {
  472. err = a.Client.DeleteSecret(ctx, psr.GetRemoteKey())
  473. return err
  474. }
  475. byteSecretMap, err := json.Marshal(secretMap)
  476. if err != nil {
  477. return err
  478. }
  479. err = a.Client.UpdateSecret(ctx, psr.GetRemoteKey(), string(byteSecretMap))
  480. return err
  481. }
  482. func (a *akeylessBase) getAkeylessHTTPClient(ctx context.Context, provider *esv1.AkeylessProvider) (*http.Client, error) {
  483. client := &http.Client{Timeout: 30 * time.Second}
  484. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  485. return client, nil
  486. }
  487. cert, err := esutils.FetchCACertFromSource(ctx, esutils.CreateCertOpts{
  488. StoreKind: a.storeKind,
  489. Client: a.kube,
  490. Namespace: a.namespace,
  491. CABundle: provider.CABundle,
  492. CAProvider: provider.CAProvider,
  493. })
  494. if err != nil {
  495. return nil, err
  496. }
  497. caCertPool := x509.NewCertPool()
  498. ok := caCertPool.AppendCertsFromPEM(cert)
  499. if !ok {
  500. return nil, errors.New("failed to append caBundle")
  501. }
  502. tlsConf := &tls.Config{
  503. RootCAs: caCertPool,
  504. MinVersion: tls.VersionTLS12,
  505. }
  506. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  507. return client, nil
  508. }