auth_iam.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package vault
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "path/filepath"
  20. "github.com/aws/aws-sdk-go/aws"
  21. "github.com/aws/aws-sdk-go/aws/credentials"
  22. "github.com/aws/aws-sdk-go/aws/credentials/stscreds"
  23. "github.com/golang-jwt/jwt/v5"
  24. authaws "github.com/hashicorp/vault/api/auth/aws"
  25. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. "github.com/external-secrets/external-secrets/pkg/constants"
  28. "github.com/external-secrets/external-secrets/pkg/metrics"
  29. vaultiamauth "github.com/external-secrets/external-secrets/pkg/provider/vault/iamauth"
  30. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  31. )
  32. const (
  33. defaultAWSRegion = "us-east-1"
  34. defaultAWSAuthMountPath = "aws"
  35. errNoAWSAuthMethodFound = "no AWS authentication method found: expected either IRSA or Pod Identity"
  36. errIrsaTokenFileNotFoundOnPod = "web identity token file not found at %s location: %w"
  37. errIrsaTokenFileNotReadable = "could not read the web identity token from the file %s: %w"
  38. errIrsaTokenNotValidJWT = "could not parse web identity token available at %s. not a valid jwt?: %w"
  39. errIrsaTokenNotValidClaims = "could not find pod identity info on token %s"
  40. )
  41. func setIamAuthToken(ctx context.Context, v *client, jwtProvider vaultutil.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) (bool, error) {
  42. iamAuth := v.store.Auth.Iam
  43. isClusterKind := v.storeKind == esv1.ClusterSecretStoreKind
  44. if iamAuth != nil {
  45. err := v.requestTokenWithIamAuth(ctx, iamAuth, isClusterKind, v.kube, v.namespace, jwtProvider, assumeRoler)
  46. if err != nil {
  47. return true, err
  48. }
  49. return true, nil
  50. }
  51. return false, nil
  52. }
  53. func (c *client) requestTokenWithIamAuth(ctx context.Context, iamAuth *esv1.VaultIamAuth, isClusterKind bool, k kclient.Client, n string, jwtProvider vaultutil.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) error {
  54. jwtAuth := iamAuth.JWTAuth
  55. secretRefAuth := iamAuth.SecretRef
  56. regionAWS := c.getRegionOrDefault(iamAuth.Region)
  57. awsAuthMountPath := c.getAuthMountPathOrDefault(iamAuth.Path)
  58. var creds *credentials.Credentials
  59. var err error
  60. if jwtAuth != nil { // use credentials from a sa explicitly defined and referenced. Highest preference is given to this method/configuration.
  61. creds, err = vaultiamauth.CredsFromServiceAccount(ctx, *iamAuth, regionAWS, isClusterKind, k, n, jwtProvider)
  62. if err != nil {
  63. return err
  64. }
  65. } else if secretRefAuth != nil { // if jwtAuth is not defined, check if secretRef is defined. Second preference.
  66. logger.V(1).Info("using credentials from secretRef")
  67. creds, err = vaultiamauth.CredsFromSecretRef(ctx, *iamAuth, c.storeKind, k, n)
  68. if err != nil {
  69. return err
  70. }
  71. }
  72. // Neither of jwtAuth or secretRefAuth defined. Last preference.
  73. // Default to controller pod's identity
  74. if jwtAuth == nil && secretRefAuth == nil {
  75. creds, err = c.getControllerPodCredentials(ctx, regionAWS, k, jwtProvider)
  76. if err != nil {
  77. return err
  78. }
  79. }
  80. config := aws.NewConfig().WithEndpointResolver(vaultiamauth.ResolveEndpoint())
  81. if creds != nil {
  82. config.WithCredentials(creds)
  83. }
  84. if regionAWS != "" {
  85. config.WithRegion(regionAWS)
  86. }
  87. sess, err := vaultiamauth.GetAWSSession(config)
  88. if err != nil {
  89. return err
  90. }
  91. if iamAuth.AWSIAMRole != "" {
  92. stsclient := assumeRoler(sess)
  93. if iamAuth.ExternalID != "" {
  94. var setExternalID = func(p *stscreds.AssumeRoleProvider) {
  95. p.ExternalID = aws.String(iamAuth.ExternalID)
  96. }
  97. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole, setExternalID))
  98. } else {
  99. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole))
  100. }
  101. }
  102. getCreds, err := sess.Config.Credentials.Get()
  103. if err != nil {
  104. return err
  105. }
  106. // Set environment variables. These would be fetched by Login
  107. _ = os.Setenv("AWS_ACCESS_KEY_ID", getCreds.AccessKeyID)
  108. _ = os.Setenv("AWS_SECRET_ACCESS_KEY", getCreds.SecretAccessKey)
  109. _ = os.Setenv("AWS_SESSION_TOKEN", getCreds.SessionToken)
  110. var awsAuthClient *authaws.AWSAuth
  111. if iamAuth.VaultAWSIAMServerID != "" {
  112. awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath), authaws.WithIAMServerIDHeader(iamAuth.VaultAWSIAMServerID))
  113. if err != nil {
  114. return err
  115. }
  116. } else {
  117. awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath))
  118. if err != nil {
  119. return err
  120. }
  121. }
  122. _, err = c.auth.Login(ctx, awsAuthClient)
  123. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  124. if err != nil {
  125. return err
  126. }
  127. return nil
  128. }
  129. func (c *client) getRegionOrDefault(region string) string {
  130. if region != "" {
  131. return region
  132. }
  133. return defaultAWSRegion
  134. }
  135. func (c *client) getAuthMountPathOrDefault(path string) string {
  136. if path != "" {
  137. return path
  138. }
  139. return defaultAWSAuthMountPath
  140. }
  141. func (c *client) getControllerPodCredentials(ctx context.Context, region string, k kclient.Client, jwtProvider vaultutil.JwtProviderFactory) (*credentials.Credentials, error) {
  142. // First try IRSA (Web Identity Token) - checking if controller pod's service account is IRSA enabled
  143. tokenFile := os.Getenv(vaultiamauth.AWSWebIdentityTokenFileEnvVar)
  144. if tokenFile != "" {
  145. logger.V(1).Info("using IRSA token for authentication")
  146. return c.getCredsFromIRSAToken(ctx, tokenFile, region, k, jwtProvider)
  147. }
  148. // Check for Pod Identity environment variables.
  149. podIdentityURI := os.Getenv(vaultiamauth.AWSContainerCredentialsFullURIEnvVar)
  150. if podIdentityURI != "" {
  151. logger.V(1).Info("using Pod Identity for authentication")
  152. // Return nil to let AWS SDK v1 container credential provider handle Pod Identity automatically
  153. return nil, nil
  154. }
  155. // No IRSA or Pod Identity found.
  156. return nil, errors.New(errNoAWSAuthMethodFound)
  157. }
  158. func (c *client) getCredsFromIRSAToken(ctx context.Context, tokenFile, region string, k kclient.Client, jwtProvider vaultutil.JwtProviderFactory) (*credentials.Credentials, error) {
  159. // IRSA enabled service account, let's check that the jwt token filemount and file exists
  160. if _, err := os.Stat(filepath.Clean(tokenFile)); err != nil {
  161. return nil, fmt.Errorf(errIrsaTokenFileNotFoundOnPod, tokenFile, err)
  162. }
  163. // everything looks good so far, let's fetch the jwt token from AWS_WEB_IDENTITY_TOKEN_FILE
  164. jwtByte, err := os.ReadFile(filepath.Clean(tokenFile))
  165. if err != nil {
  166. return nil, fmt.Errorf(errIrsaTokenFileNotReadable, tokenFile, err)
  167. }
  168. // let's parse the jwt token
  169. parser := jwt.NewParser(jwt.WithoutClaimsValidation())
  170. token, _, err := parser.ParseUnverified(string(jwtByte), jwt.MapClaims{})
  171. if err != nil {
  172. return nil, fmt.Errorf(errIrsaTokenNotValidJWT, tokenFile, err) // JWT token parser error
  173. }
  174. var ns string
  175. var sa string
  176. // let's fetch the namespace and serviceaccount from parsed jwt token
  177. claims, ok := token.Claims.(jwt.MapClaims)
  178. if !ok {
  179. return nil, fmt.Errorf(errIrsaTokenNotValidClaims, tokenFile)
  180. }
  181. k8s, ok := claims["kubernetes.io"].(map[string]any)
  182. if !ok {
  183. return nil, fmt.Errorf(errIrsaTokenNotValidClaims, tokenFile)
  184. }
  185. ns, ok = k8s["namespace"].(string)
  186. if !ok {
  187. return nil, fmt.Errorf(errIrsaTokenNotValidClaims, tokenFile)
  188. }
  189. saMap, ok := k8s["serviceaccount"].(map[string]any)
  190. if !ok {
  191. return nil, fmt.Errorf(errIrsaTokenNotValidClaims, tokenFile)
  192. }
  193. sa, ok = saMap["name"].(string)
  194. if !ok {
  195. return nil, fmt.Errorf(errIrsaTokenNotValidClaims, tokenFile)
  196. }
  197. return vaultiamauth.CredsFromControllerServiceAccount(ctx, sa, ns, region, k, jwtProvider)
  198. }