validate.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  18. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  19. "github.com/external-secrets/external-secrets/pkg/utils"
  20. )
  21. const (
  22. errInvalidCredentials = "invalid vault credentials: %w"
  23. errInvalidStore = "invalid store"
  24. errInvalidStoreSpec = "invalid store spec"
  25. errInvalidStoreProv = "invalid store provider"
  26. errInvalidVaultProv = "invalid vault provider"
  27. errInvalidAppRoleRef = "invalid Auth.AppRole.RoleRef: %w"
  28. errInvalidAppRoleSec = "invalid Auth.AppRole.SecretRef: %w"
  29. errInvalidClientCert = "invalid Auth.Cert.ClientCert: %w"
  30. errInvalidCertSec = "invalid Auth.Cert.SecretRef: %w"
  31. errInvalidJwtSec = "invalid Auth.Jwt.SecretRef: %w"
  32. errInvalidJwtK8sSA = "invalid Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef: %w"
  33. errInvalidKubeSA = "invalid Auth.Kubernetes.ServiceAccountRef: %w"
  34. errInvalidKubeSec = "invalid Auth.Kubernetes.SecretRef: %w"
  35. errInvalidLdapSec = "invalid Auth.Ldap.SecretRef: %w"
  36. errInvalidTokenRef = "invalid Auth.TokenSecretRef: %w"
  37. errInvalidUserPassSec = "invalid Auth.UserPass.SecretRef: %w"
  38. errInvalidClientTLSCert = "invalid ClientTLS.ClientCert: %w"
  39. errInvalidClientTLSSecret = "invalid ClientTLS.SecretRef: %w"
  40. errInvalidClientTLS = "when provided, both ClientTLS.ClientCert and ClientTLS.SecretRef should be provided"
  41. )
  42. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  43. if store == nil {
  44. return nil, errors.New(errInvalidStore)
  45. }
  46. spc := store.GetSpec()
  47. if spc == nil {
  48. return nil, errors.New(errInvalidStoreSpec)
  49. }
  50. if spc.Provider == nil {
  51. return nil, errors.New(errInvalidStoreProv)
  52. }
  53. vaultProvider := spc.Provider.Vault
  54. if vaultProvider == nil {
  55. return nil, errors.New(errInvalidVaultProv)
  56. }
  57. if vaultProvider.Auth != nil {
  58. if vaultProvider.Auth.AppRole != nil {
  59. // check SecretRef for valid configuration
  60. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.AppRole.SecretRef); err != nil {
  61. return nil, fmt.Errorf(errInvalidAppRoleSec, err)
  62. }
  63. // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
  64. if vaultProvider.Auth.AppRole.RoleID == "" { // prevents further RoleID tests if .auth.appRole.roleId is given
  65. if vaultProvider.Auth.AppRole.RoleRef != nil { // check RoleRef for valid configuration
  66. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.AppRole.RoleRef); err != nil {
  67. return nil, fmt.Errorf(errInvalidAppRoleRef, err)
  68. }
  69. } else { // we ran out of ways to get RoleID. return an appropriate error
  70. return nil, errors.New(errInvalidAppRoleID)
  71. }
  72. }
  73. }
  74. if vaultProvider.Auth.Cert != nil {
  75. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Cert.ClientCert); err != nil {
  76. return nil, fmt.Errorf(errInvalidClientCert, err)
  77. }
  78. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Cert.SecretRef); err != nil {
  79. return nil, fmt.Errorf(errInvalidCertSec, err)
  80. }
  81. }
  82. if vaultProvider.Auth.Jwt != nil {
  83. if vaultProvider.Auth.Jwt.SecretRef != nil {
  84. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Jwt.SecretRef); err != nil {
  85. return nil, fmt.Errorf(errInvalidJwtSec, err)
  86. }
  87. } else if vaultProvider.Auth.Jwt.KubernetesServiceAccountToken != nil {
  88. if err := utils.ValidateReferentServiceAccountSelector(store, vaultProvider.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef); err != nil {
  89. return nil, fmt.Errorf(errInvalidJwtK8sSA, err)
  90. }
  91. } else {
  92. return nil, errors.New(errJwtNoTokenSource)
  93. }
  94. }
  95. if vaultProvider.Auth.Kubernetes != nil {
  96. if vaultProvider.Auth.Kubernetes.ServiceAccountRef != nil {
  97. if err := utils.ValidateReferentServiceAccountSelector(store, *vaultProvider.Auth.Kubernetes.ServiceAccountRef); err != nil {
  98. return nil, fmt.Errorf(errInvalidKubeSA, err)
  99. }
  100. }
  101. if vaultProvider.Auth.Kubernetes.SecretRef != nil {
  102. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Kubernetes.SecretRef); err != nil {
  103. return nil, fmt.Errorf(errInvalidKubeSec, err)
  104. }
  105. }
  106. }
  107. if vaultProvider.Auth.Ldap != nil {
  108. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Ldap.SecretRef); err != nil {
  109. return nil, fmt.Errorf(errInvalidLdapSec, err)
  110. }
  111. }
  112. if vaultProvider.Auth.UserPass != nil {
  113. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.UserPass.SecretRef); err != nil {
  114. return nil, fmt.Errorf(errInvalidUserPassSec, err)
  115. }
  116. }
  117. if vaultProvider.Auth.TokenSecretRef != nil {
  118. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.TokenSecretRef); err != nil {
  119. return nil, fmt.Errorf(errInvalidTokenRef, err)
  120. }
  121. }
  122. if vaultProvider.Auth.Iam != nil {
  123. if vaultProvider.Auth.Iam.JWTAuth != nil {
  124. if vaultProvider.Auth.Iam.JWTAuth.ServiceAccountRef != nil {
  125. if err := utils.ValidateReferentServiceAccountSelector(store, *vaultProvider.Auth.Iam.JWTAuth.ServiceAccountRef); err != nil {
  126. return nil, fmt.Errorf(errInvalidTokenRef, err)
  127. }
  128. }
  129. }
  130. if vaultProvider.Auth.Iam.SecretRef != nil {
  131. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Iam.SecretRef.AccessKeyID); err != nil {
  132. return nil, fmt.Errorf(errInvalidTokenRef, err)
  133. }
  134. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Iam.SecretRef.SecretAccessKey); err != nil {
  135. return nil, fmt.Errorf(errInvalidTokenRef, err)
  136. }
  137. if vaultProvider.Auth.Iam.SecretRef.SessionToken != nil {
  138. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Iam.SecretRef.SessionToken); err != nil {
  139. return nil, fmt.Errorf(errInvalidTokenRef, err)
  140. }
  141. }
  142. }
  143. }
  144. }
  145. if vaultProvider.ClientTLS.CertSecretRef != nil && vaultProvider.ClientTLS.KeySecretRef != nil {
  146. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.ClientTLS.CertSecretRef); err != nil {
  147. return nil, fmt.Errorf(errInvalidClientTLSCert, err)
  148. }
  149. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.ClientTLS.KeySecretRef); err != nil {
  150. return nil, fmt.Errorf(errInvalidClientTLSSecret, err)
  151. }
  152. } else if vaultProvider.ClientTLS.CertSecretRef != nil || vaultProvider.ClientTLS.KeySecretRef != nil {
  153. return nil, errors.New(errInvalidClientTLS)
  154. }
  155. return nil, nil
  156. }
  157. func (c *client) Validate() (esv1.ValidationResult, error) {
  158. // when using referent namespace we can not validate the token
  159. // because the namespace is not known yet when Validate() is called
  160. // from the SecretStore controller.
  161. if c.storeKind == esv1.ClusterSecretStoreKind && isReferentSpec(c.store) {
  162. return esv1.ValidationResultUnknown, nil
  163. }
  164. _, err := checkToken(context.Background(), c.token)
  165. if err != nil {
  166. return esv1.ValidationResultError, fmt.Errorf(errInvalidCredentials, err)
  167. }
  168. return esv1.ValidationResultReady, nil
  169. }