| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package vault
- import (
- "bytes"
- "context"
- "crypto/tls"
- "crypto/x509"
- "encoding/json"
- "errors"
- "fmt"
- "net/http"
- "os"
- "strings"
- "time"
- "github.com/aws/aws-sdk-go/aws"
- "github.com/aws/aws-sdk-go/aws/credentials"
- "github.com/aws/aws-sdk-go/aws/credentials/stscreds"
- "github.com/go-logr/logr"
- "github.com/golang-jwt/jwt/v5"
- vault "github.com/hashicorp/vault/api"
- approle "github.com/hashicorp/vault/api/auth/approle"
- authaws "github.com/hashicorp/vault/api/auth/aws"
- authkubernetes "github.com/hashicorp/vault/api/auth/kubernetes"
- authldap "github.com/hashicorp/vault/api/auth/ldap"
- authuserpass "github.com/hashicorp/vault/api/auth/userpass"
- "github.com/spf13/pflag"
- "github.com/tidwall/gjson"
- authenticationv1 "k8s.io/api/authentication/v1"
- corev1 "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/client-go/kubernetes"
- typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
- ctrl "sigs.k8s.io/controller-runtime"
- kclient "sigs.k8s.io/controller-runtime/pkg/client"
- ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
- "github.com/external-secrets/external-secrets/pkg/cache"
- "github.com/external-secrets/external-secrets/pkg/constants"
- "github.com/external-secrets/external-secrets/pkg/feature"
- "github.com/external-secrets/external-secrets/pkg/find"
- "github.com/external-secrets/external-secrets/pkg/metrics"
- vaultiamauth "github.com/external-secrets/external-secrets/pkg/provider/vault/iamauth"
- "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
- "github.com/external-secrets/external-secrets/pkg/utils"
- )
- var (
- _ esv1beta1.Provider = &Connector{}
- _ esv1beta1.SecretsClient = &client{}
- enableCache bool
- logger = ctrl.Log.WithName("provider").WithName("vault")
- clientCache *cache.Cache[util.Client]
- )
- const (
- serviceAccTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/token"
- defaultAWSRegion = "us-east-1"
- defaultAWSAuthMountPath = "aws"
- errVaultStore = "received invalid Vault SecretStore resource: %w"
- errVaultCacheCreate = "cannot create Vault client cache: %s"
- errVaultCacheRemove = "error removing item from Vault client cache: %w"
- errVaultCacheEviction = "unexpected eviction from Vault client cache"
- errVaultClient = "cannot setup new vault client: %w"
- errVaultCert = "cannot set Vault CA certificate: %w"
- errReadSecret = "cannot read secret data from Vault: %w"
- errAuthFormat = "cannot initialize Vault client: no valid auth method specified"
- errInvalidCredentials = "invalid vault credentials: %w"
- errDataField = "failed to find data field"
- errJSONUnmarshall = "failed to unmarshall JSON"
- errPathInvalid = "provided Path isn't a valid kv v2 path"
- errUnexpectedKey = "unexpected key in data: %s"
- errVaultToken = "cannot parse Vault authentication token: %w"
- errVaultRequest = "error from Vault request: %w"
- errServiceAccount = "cannot read Kubernetes service account token from file system: %w"
- errJwtNoTokenSource = "neither `secretRef` nor `kubernetesServiceAccountToken` was supplied as token source for jwt authentication"
- errUnsupportedKvVersion = "cannot perform find operations with kv version v1"
- errUnsupportedMetadataKvVersion = "cannot perform metadata fetch operations with kv version v1"
- errNotFound = "secret not found"
- errIrsaTokenEnvVarNotFoundOnPod = "expected env variable: %s not found on controller's pod"
- errIrsaTokenFileNotFoundOnPod = "web ddentity token file not found at %s location: %w"
- errIrsaTokenFileNotReadable = "could not read the web identity token from the file %s: %w"
- errIrsaTokenNotValidJWT = "could not parse web identity token available at %s. not a valid jwt?: %w"
- errPodInfoNotFoundOnToken = "could not find pod identity info on token %s: %w"
- errGetKubeSA = "cannot get Kubernetes service account %q: %w"
- errGetKubeSASecrets = "cannot find secrets bound to service account: %q"
- errGetKubeSANoToken = "cannot find token in secrets bound to service account: %q"
- errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
- errGetKubeSecret = "cannot get Kubernetes secret %q: %w"
- errSecretKeyFmt = "cannot find secret data for key: %q"
- errConfigMapFmt = "cannot find config map data for key: %q"
- errClientTLSAuth = "error from Client TLS Auth: %q"
- errVaultRevokeToken = "error while revoking token: %w"
- errUnknownCAProvider = "unknown caProvider type given"
- errCANamespace = "cannot read secret for CAProvider due to missing namespace on kind ClusterSecretStore"
- errInvalidStore = "invalid store"
- errInvalidStoreSpec = "invalid store spec"
- errInvalidStoreProv = "invalid store provider"
- errInvalidVaultProv = "invalid vault provider"
- errInvalidAppRoleID = "invalid Auth.AppRole: neither `roleId` nor `roleRef` was supplied"
- errInvalidAppRoleRef = "invalid Auth.AppRole.RoleRef: %w"
- errInvalidAppRoleSec = "invalid Auth.AppRole.SecretRef: %w"
- errInvalidClientCert = "invalid Auth.Cert.ClientCert: %w"
- errInvalidCertSec = "invalid Auth.Cert.SecretRef: %w"
- errInvalidJwtSec = "invalid Auth.Jwt.SecretRef: %w"
- errInvalidJwtK8sSA = "invalid Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef: %w"
- errInvalidKubeSA = "invalid Auth.Kubernetes.ServiceAccountRef: %w"
- errInvalidKubeSec = "invalid Auth.Kubernetes.SecretRef: %w"
- errInvalidLdapSec = "invalid Auth.Ldap.SecretRef: %w"
- errInvalidTokenRef = "invalid Auth.TokenSecretRef: %w"
- errInvalidUserPassSec = "invalid Auth.UserPass.SecretRef: %w"
- )
- // https://github.com/external-secrets/external-secrets/issues/644
- var _ esv1beta1.SecretsClient = &client{}
- var _ esv1beta1.Provider = &Connector{}
- type client struct {
- kube kclient.Client
- store *esv1beta1.VaultProvider
- log logr.Logger
- corev1 typedcorev1.CoreV1Interface
- client util.Client
- auth util.Auth
- logical util.Logical
- token util.Token
- namespace string
- storeKind string
- }
- func NewVaultClient(c *vault.Config) (util.Client, error) {
- cl, err := vault.NewClient(c)
- if err != nil {
- return nil, err
- }
- auth := cl.Auth()
- logical := cl.Logical()
- token := cl.Auth().Token()
- out := util.VClient{
- SetTokenFunc: cl.SetToken,
- TokenFunc: cl.Token,
- ClearTokenFunc: cl.ClearToken,
- AuthField: auth,
- AuthTokenField: token,
- LogicalField: logical,
- SetNamespaceFunc: cl.SetNamespace,
- AddHeaderFunc: cl.AddHeader,
- }
- return &out, nil
- }
- func getVaultClient(c *Connector, store esv1beta1.GenericStore, cfg *vault.Config) (util.Client, error) {
- isStaticToken := store.GetSpec().Provider.Vault.Auth.TokenSecretRef != nil
- useCache := enableCache && !isStaticToken
- key := cache.Key{
- Name: store.GetObjectMeta().Name,
- Namespace: store.GetObjectMeta().Namespace,
- Kind: store.GetTypeMeta().Kind,
- }
- if useCache {
- client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
- if ok {
- return client, nil
- }
- }
- client, err := c.NewVaultClient(cfg)
- if err != nil {
- return nil, fmt.Errorf(errVaultClient, err)
- }
- if useCache && !clientCache.Contains(key) {
- clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
- }
- return client, nil
- }
- type Connector struct {
- NewVaultClient func(c *vault.Config) (util.Client, error)
- }
- // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
- func (c *Connector) Capabilities() esv1beta1.SecretStoreCapabilities {
- return esv1beta1.SecretStoreReadWrite
- }
- func (c *Connector) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
- // controller-runtime/client does not support TokenRequest or other subresource APIs
- // so we need to construct our own client and use it to fetch tokens
- // (for Kubernetes service account token auth)
- restCfg, err := ctrlcfg.GetConfig()
- if err != nil {
- return nil, err
- }
- clientset, err := kubernetes.NewForConfig(restCfg)
- if err != nil {
- return nil, err
- }
- return c.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
- }
- func (c *Connector) newClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
- storeSpec := store.GetSpec()
- if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
- return nil, errors.New(errVaultStore)
- }
- vaultSpec := storeSpec.Provider.Vault
- vStore, cfg, err := c.prepareConfig(kube, corev1, vaultSpec, storeSpec.RetrySettings, namespace, store.GetObjectKind().GroupVersionKind().Kind)
- if err != nil {
- return nil, err
- }
- client, err := getVaultClient(c, store, cfg)
- if err != nil {
- return nil, fmt.Errorf(errVaultClient, err)
- }
- return c.initClient(ctx, vStore, client, cfg, vaultSpec)
- }
- func (c *Connector) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, namespace string) (util.Client, error) {
- vStore, cfg, err := c.prepareConfig(kube, corev1, vaultSpec, nil, namespace, "Generator")
- if err != nil {
- return nil, err
- }
- client, err := c.NewVaultClient(cfg)
- if err != nil {
- return nil, err
- }
- _, err = c.initClient(ctx, vStore, client, cfg, vaultSpec)
- if err != nil {
- return nil, err
- }
- return client, nil
- }
- func (c *Connector) prepareConfig(kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, retrySettings *esv1beta1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
- vStore := &client{
- kube: kube,
- corev1: corev1,
- store: vaultSpec,
- log: logger,
- namespace: namespace,
- storeKind: storeKind,
- }
- cfg, err := vStore.newConfig()
- if err != nil {
- return nil, nil, err
- }
- // Setup retry options if present
- if retrySettings != nil {
- if retrySettings.MaxRetries != nil {
- cfg.MaxRetries = int(*retrySettings.MaxRetries)
- } else {
- // By default we rely only on the reconciliation process for retrying
- cfg.MaxRetries = 0
- }
- if retrySettings.RetryInterval != nil {
- retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
- if err != nil {
- return nil, nil, err
- }
- cfg.MinRetryWait = retryWait
- cfg.MaxRetryWait = retryWait
- }
- }
- return vStore, cfg, nil
- }
- func (c *Connector) initClient(ctx context.Context, vStore *client, client util.Client, cfg *vault.Config, vaultSpec *esv1beta1.VaultProvider) (esv1beta1.SecretsClient, error) {
- if vaultSpec.Namespace != nil {
- client.SetNamespace(*vaultSpec.Namespace)
- }
- if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
- client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
- }
- vStore.client = client
- vStore.auth = client.Auth()
- vStore.logical = client.Logical()
- vStore.token = client.AuthToken()
- // allow SecretStore controller validation to pass
- // when using referent namespace.
- if vStore.storeKind == esv1beta1.ClusterSecretStoreKind && vStore.namespace == "" && isReferentSpec(vaultSpec) {
- return vStore, nil
- }
- if err := vStore.setAuth(ctx, cfg); err != nil {
- return nil, err
- }
- return vStore, nil
- }
- func (c *Connector) ValidateStore(store esv1beta1.GenericStore) error {
- if store == nil {
- return fmt.Errorf(errInvalidStore)
- }
- spc := store.GetSpec()
- if spc == nil {
- return fmt.Errorf(errInvalidStoreSpec)
- }
- if spc.Provider == nil {
- return fmt.Errorf(errInvalidStoreProv)
- }
- p := spc.Provider.Vault
- if p == nil {
- return fmt.Errorf(errInvalidVaultProv)
- }
- if p.Auth.AppRole != nil {
- // check SecretRef for valid configuration
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.AppRole.SecretRef); err != nil {
- return fmt.Errorf(errInvalidAppRoleSec, err)
- }
- // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
- if p.Auth.AppRole.RoleID == "" { // prevents further RoleID tests if .auth.appRole.roleId is given
- if p.Auth.AppRole.RoleRef != nil { // check RoleRef for valid configuration
- if err := utils.ValidateReferentSecretSelector(store, *p.Auth.AppRole.RoleRef); err != nil {
- return fmt.Errorf(errInvalidAppRoleRef, err)
- }
- } else { // we ran out of ways to get RoleID. return an appropriate error
- return fmt.Errorf(errInvalidAppRoleID)
- }
- }
- }
- if p.Auth.Cert != nil {
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.ClientCert); err != nil {
- return fmt.Errorf(errInvalidClientCert, err)
- }
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.SecretRef); err != nil {
- return fmt.Errorf(errInvalidCertSec, err)
- }
- }
- if p.Auth.Jwt != nil {
- if p.Auth.Jwt.SecretRef != nil {
- if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Jwt.SecretRef); err != nil {
- return fmt.Errorf(errInvalidJwtSec, err)
- }
- } else if p.Auth.Jwt.KubernetesServiceAccountToken != nil {
- if err := utils.ValidateReferentServiceAccountSelector(store, p.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef); err != nil {
- return fmt.Errorf(errInvalidJwtK8sSA, err)
- }
- } else {
- return fmt.Errorf(errJwtNoTokenSource)
- }
- }
- if p.Auth.Kubernetes != nil {
- if p.Auth.Kubernetes.ServiceAccountRef != nil {
- if err := utils.ValidateReferentServiceAccountSelector(store, *p.Auth.Kubernetes.ServiceAccountRef); err != nil {
- return fmt.Errorf(errInvalidKubeSA, err)
- }
- }
- if p.Auth.Kubernetes.SecretRef != nil {
- if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Kubernetes.SecretRef); err != nil {
- return fmt.Errorf(errInvalidKubeSec, err)
- }
- }
- }
- if p.Auth.Ldap != nil {
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.Ldap.SecretRef); err != nil {
- return fmt.Errorf(errInvalidLdapSec, err)
- }
- }
- if p.Auth.UserPass != nil {
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.UserPass.SecretRef); err != nil {
- return fmt.Errorf(errInvalidUserPassSec, err)
- }
- }
- if p.Auth.TokenSecretRef != nil {
- if err := utils.ValidateReferentSecretSelector(store, *p.Auth.TokenSecretRef); err != nil {
- return fmt.Errorf(errInvalidTokenRef, err)
- }
- }
- if p.Auth.Iam != nil {
- if p.Auth.Iam.JWTAuth != nil {
- if p.Auth.Iam.JWTAuth.ServiceAccountRef != nil {
- if err := utils.ValidateReferentServiceAccountSelector(store, *p.Auth.Iam.JWTAuth.ServiceAccountRef); err != nil {
- return fmt.Errorf(errInvalidTokenRef, err)
- }
- }
- }
- if p.Auth.Iam.SecretRef != nil {
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.Iam.SecretRef.AccessKeyID); err != nil {
- return fmt.Errorf(errInvalidTokenRef, err)
- }
- if err := utils.ValidateReferentSecretSelector(store, p.Auth.Iam.SecretRef.SecretAccessKey); err != nil {
- return fmt.Errorf(errInvalidTokenRef, err)
- }
- if p.Auth.Iam.SecretRef.SessionToken != nil {
- if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Iam.SecretRef.SessionToken); err != nil {
- return fmt.Errorf(errInvalidTokenRef, err)
- }
- }
- }
- }
- return nil
- }
- func (v *client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
- path := v.buildPath(remoteRef.GetRemoteKey())
- metaPath, err := v.buildMetadataPath(remoteRef.GetRemoteKey())
- if err != nil {
- return err
- }
- // Retrieve the secret map from vault and convert the secret value in string form.
- secretVal, err := v.readSecret(ctx, path, "")
- // If error is not of type secret not found, we should error
- if err != nil && errors.Is(err, esv1beta1.NoSecretError{}) {
- return nil
- }
- if err != nil {
- return err
- }
- metadata, err := v.readSecretMetadata(ctx, remoteRef.GetRemoteKey())
- if err != nil {
- return err
- }
- manager, ok := metadata["managed-by"]
- if !ok || manager != "external-secrets" {
- return nil
- }
- // If Push for a Property, we need to delete the property and update the secret
- if remoteRef.GetProperty() != "" {
- delete(secretVal, remoteRef.GetProperty())
- // If the only key left in the remote secret is the reference of the metadata.
- if v.store.Version == esv1beta1.VaultKVStoreV1 && len(secretVal) == 1 {
- delete(secretVal, "custom_metadata")
- }
- if len(secretVal) > 0 {
- secretToPush := secretVal
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- secretToPush = map[string]interface{}{
- "data": secretVal,
- }
- }
- _, err = v.logical.WriteWithContext(ctx, path, secretToPush)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
- return err
- }
- }
- _, err = v.logical.DeleteWithContext(ctx, path)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
- if err != nil {
- return fmt.Errorf("could not delete secret %v: %w", remoteRef.GetRemoteKey(), err)
- }
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- _, err = v.logical.DeleteWithContext(ctx, metaPath)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
- if err != nil {
- return fmt.Errorf("could not delete secret metadata %v: %w", remoteRef.GetRemoteKey(), err)
- }
- }
- return nil
- }
- func (v *client) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
- value := secret.Data[data.GetSecretKey()]
- label := map[string]interface{}{
- "custom_metadata": map[string]string{
- "managed-by": "external-secrets",
- },
- }
- secretVal := make(map[string]interface{})
- path := v.buildPath(data.GetRemoteKey())
- metaPath, err := v.buildMetadataPath(data.GetRemoteKey())
- if err != nil {
- return err
- }
- // Retrieve the secret map from vault and convert the secret value in string form.
- vaultSecret, err := v.readSecret(ctx, path, "")
- // If error is not of type secret not found, we should error
- if err != nil && !errors.Is(err, esv1beta1.NoSecretError{}) {
- return err
- }
- // If the secret exists (err == nil), we should check if it is managed by external-secrets
- if err == nil {
- metadata, err := v.readSecretMetadata(ctx, data.GetRemoteKey())
- if err != nil {
- return err
- }
- manager, ok := metadata["managed-by"]
- if !ok || manager != "external-secrets" {
- return fmt.Errorf("secret not managed by external-secrets")
- }
- }
- // Remove the metadata map to check the reconcile difference
- if v.store.Version == esv1beta1.VaultKVStoreV1 {
- delete(vaultSecret, "custom_metadata")
- }
- buf := &bytes.Buffer{}
- enc := json.NewEncoder(buf)
- enc.SetEscapeHTML(false)
- err = enc.Encode(vaultSecret)
- if err != nil {
- return fmt.Errorf("error encoding vault secret: %w", err)
- }
- vaultSecretValue := bytes.TrimSpace(buf.Bytes())
- if err != nil {
- return fmt.Errorf("error marshaling vault secret: %w", err)
- }
- if bytes.Equal(vaultSecretValue, value) {
- return nil
- }
- // If a Push of a property only, we should merge and add/update the property
- if data.GetProperty() != "" {
- if _, ok := vaultSecret[data.GetProperty()]; ok {
- d := vaultSecret[data.GetProperty()].(string)
- if err != nil {
- return fmt.Errorf("error marshaling vault secret: %w", err)
- }
- // If the property has the same value, don't update the secret
- if bytes.Equal([]byte(d), value) {
- return nil
- }
- }
- for k, v := range vaultSecret {
- secretVal[k] = v
- }
- // Secret got from vault is already on map[string]string format
- secretVal[data.GetProperty()] = string(value)
- } else {
- err = json.Unmarshal(value, &secretVal)
- if err != nil {
- return fmt.Errorf("error unmarshalling vault secret: %w", err)
- }
- }
- secretToPush := secretVal
- // Adding custom_metadata to the secret for KV v1
- if v.store.Version == esv1beta1.VaultKVStoreV1 {
- secretToPush["custom_metadata"] = label["custom_metadata"]
- }
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- secretToPush = map[string]interface{}{
- "data": secretVal,
- }
- }
- if err != nil {
- return fmt.Errorf("failed to convert value to a valid JSON: %w", err)
- }
- // Secret metadata should be pushed separately only for KV2
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- _, err = v.logical.WriteWithContext(ctx, metaPath, label)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
- if err != nil {
- return err
- }
- }
- // Otherwise, create or update the version.
- _, err = v.logical.WriteWithContext(ctx, path, secretToPush)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
- return err
- }
- // GetAllSecrets gets multiple secrets from the provider and loads into a kubernetes secret.
- // First load all secrets from secretStore path configuration
- // Then, gets secrets from a matching name or matching custom_metadata.
- func (v *client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
- if v.store.Version == esv1beta1.VaultKVStoreV1 {
- return nil, errors.New(errUnsupportedKvVersion)
- }
- searchPath := ""
- if ref.Path != nil {
- searchPath = *ref.Path + "/"
- }
- potentialSecrets, err := v.listSecrets(ctx, searchPath)
- if err != nil {
- return nil, err
- }
- if ref.Name != nil {
- return v.findSecretsFromName(ctx, potentialSecrets, *ref.Name)
- }
- return v.findSecretsFromTags(ctx, potentialSecrets, ref.Tags)
- }
- func (v *client) findSecretsFromTags(ctx context.Context, candidates []string, tags map[string]string) (map[string][]byte, error) {
- secrets := make(map[string][]byte)
- for _, name := range candidates {
- match := true
- metadata, err := v.readSecretMetadata(ctx, name)
- if err != nil {
- return nil, err
- }
- for tk, tv := range tags {
- p, ok := metadata[tk]
- if !ok || p != tv {
- match = false
- break
- }
- }
- if match {
- secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
- if errors.Is(err, esv1beta1.NoSecretError{}) {
- continue
- }
- if err != nil {
- return nil, err
- }
- if secret != nil {
- secrets[name] = secret
- }
- }
- }
- return secrets, nil
- }
- func (v *client) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName) (map[string][]byte, error) {
- secrets := make(map[string][]byte)
- matcher, err := find.New(ref)
- if err != nil {
- return nil, err
- }
- for _, name := range candidates {
- ok := matcher.MatchName(name)
- if ok {
- secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
- if errors.Is(err, esv1beta1.NoSecretError{}) {
- continue
- }
- if err != nil {
- return nil, err
- }
- if secret != nil {
- secrets[name] = secret
- }
- }
- }
- return secrets, nil
- }
- func (v *client) listSecrets(ctx context.Context, path string) ([]string, error) {
- secrets := make([]string, 0)
- url, err := v.buildMetadataPath(path)
- if err != nil {
- return nil, err
- }
- secret, err := v.logical.ListWithContext(ctx, url)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultListSecrets, err)
- if err != nil {
- return nil, fmt.Errorf(errReadSecret, err)
- }
- if secret == nil {
- return nil, fmt.Errorf("provided path %v does not contain any secrets", url)
- }
- t, ok := secret.Data["keys"]
- if !ok {
- return nil, nil
- }
- paths := t.([]interface{})
- for _, p := range paths {
- strPath := p.(string)
- fullPath := path + strPath // because path always ends with a /
- if path == "" {
- fullPath = strPath
- }
- // Recurrently find secrets
- if !strings.HasSuffix(p.(string), "/") {
- secrets = append(secrets, fullPath)
- } else {
- partial, err := v.listSecrets(ctx, fullPath)
- if err != nil {
- return nil, err
- }
- secrets = append(secrets, partial...)
- }
- }
- return secrets, nil
- }
- func (v *client) readSecretMetadata(ctx context.Context, path string) (map[string]string, error) {
- metadata := make(map[string]string)
- url, err := v.buildMetadataPath(path)
- if err != nil {
- return nil, err
- }
- secret, err := v.logical.ReadWithDataWithContext(ctx, url, nil)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultReadSecretData, err)
- if err != nil {
- return nil, fmt.Errorf(errReadSecret, err)
- }
- if secret == nil {
- return nil, errors.New(errNotFound)
- }
- t, ok := secret.Data["custom_metadata"]
- if !ok {
- return nil, nil
- }
- d, ok := t.(map[string]interface{})
- if !ok {
- return metadata, nil
- }
- for k, v := range d {
- metadata[k] = v.(string)
- }
- return metadata, nil
- }
- // GetSecret supports two types:
- // 1. get the full secret as json-encoded value
- // by leaving the ref.Property empty.
- // 2. get a key from the secret.
- // Nested values are supported by specifying a gjson expression
- func (v *client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
- var data map[string]interface{}
- var err error
- if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
- if v.store.Version == esv1beta1.VaultKVStoreV1 {
- return nil, errors.New(errUnsupportedMetadataKvVersion)
- }
- metadata, err := v.readSecretMetadata(ctx, ref.Key)
- if err != nil {
- return nil, err
- }
- if len(metadata) == 0 {
- return nil, nil
- }
- data = make(map[string]interface{}, len(metadata))
- for k, v := range metadata {
- data[k] = v
- }
- } else {
- data, err = v.readSecret(ctx, ref.Key, ref.Version)
- if err != nil {
- return nil, err
- }
- }
- // Return nil if secret value is null
- if data == nil {
- return nil, esv1beta1.NoSecretError{}
- }
- jsonStr, err := json.Marshal(data)
- if err != nil {
- return nil, err
- }
- // (1): return raw json if no property is defined
- if ref.Property == "" {
- return jsonStr, nil
- }
- // For backwards compatibility we want the
- // actual keys to take precedence over gjson syntax
- // (2): extract key from secret with property
- if _, ok := data[ref.Property]; ok {
- return utils.GetByteValueFromMap(data, ref.Property)
- }
- // (3): extract key from secret using gjson
- val := gjson.Get(string(jsonStr), ref.Property)
- if !val.Exists() {
- return nil, fmt.Errorf(errSecretKeyFmt, ref.Property)
- }
- return []byte(val.String()), nil
- }
- // GetSecretMap supports two modes of operation:
- // 1. get the full secret from the vault data payload (by leaving .property empty).
- // 2. extract key/value pairs from a (nested) object.
- func (v *client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
- data, err := v.GetSecret(ctx, ref)
- if err != nil {
- return nil, err
- }
- var secretData map[string]interface{}
- err = json.Unmarshal(data, &secretData)
- if err != nil {
- return nil, err
- }
- byteMap := make(map[string][]byte, len(secretData))
- for k := range secretData {
- byteMap[k], err = utils.GetByteValueFromMap(secretData, k)
- if err != nil {
- return nil, err
- }
- }
- return byteMap, nil
- }
- func (v *client) Close(ctx context.Context) error {
- // Revoke the token if we have one set, it wasn't sourced from a TokenSecretRef,
- // and token caching isn't enabled
- if !enableCache && v.client.Token() != "" && v.store.Auth.TokenSecretRef == nil {
- err := revokeTokenIfValid(ctx, v.client)
- if err != nil {
- return err
- }
- }
- return nil
- }
- func isReferentSpec(prov *esv1beta1.VaultProvider) bool {
- if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
- return true
- }
- if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
- return true
- }
- if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
- return true
- }
- if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
- return true
- }
- if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
- (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
- prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
- (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
- return true
- }
- return false
- }
- func (v *client) Validate() (esv1beta1.ValidationResult, error) {
- // when using referent namespace we can not validate the token
- // because the namespace is not known yet when Validate() is called
- // from the SecretStore controller.
- if v.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(v.store) {
- return esv1beta1.ValidationResultUnknown, nil
- }
- _, err := checkToken(context.Background(), v.token)
- if err != nil {
- return esv1beta1.ValidationResultError, fmt.Errorf(errInvalidCredentials, err)
- }
- return esv1beta1.ValidationResultReady, nil
- }
- func (v *client) buildMetadataPath(path string) (string, error) {
- var url string
- if v.store.Version == esv1beta1.VaultKVStoreV1 {
- url = fmt.Sprintf("%s/%s", *v.store.Path, path)
- } else { // KV v2 is used
- if v.store.Path == nil && !strings.Contains(path, "data") {
- return "", fmt.Errorf(errPathInvalid)
- }
- if v.store.Path == nil {
- path = strings.Replace(path, "data", "metadata", 1)
- url = path
- } else {
- url = fmt.Sprintf("%s/metadata/%s", *v.store.Path, path)
- }
- }
- return url, nil
- }
- /*
- buildPath is a helper method to build the vault equivalent path
- from ExternalSecrets and SecretStore manifests. the path build logic
- varies depending on the SecretStore KV version:
- Example inputs/outputs:
- # simple build:
- kv version == "v2":
- provider_path: "secret/path"
- input: "foo"
- output: "secret/path/data/foo" # provider_path and data are prepended
- kv version == "v1":
- provider_path: "secret/path"
- input: "foo"
- output: "secret/path/foo" # provider_path is prepended
- # inheriting paths:
- kv version == "v2":
- provider_path: "secret/path"
- input: "secret/path/foo"
- output: "secret/path/data/foo" #data is prepended
- kv version == "v2":
- provider_path: "secret/path"
- input: "secret/path/data/foo"
- output: "secret/path/data/foo" #noop
- kv version == "v1":
- provider_path: "secret/path"
- input: "secret/path/foo"
- output: "secret/path/foo" #noop
- # provider path not defined:
- kv version == "v2":
- provider_path: nil
- input: "secret/path/foo"
- output: "secret/data/path/foo" # data is prepended to secret/
- kv version == "v2":
- provider_path: nil
- input: "secret/path/data/foo"
- output: "secret/path/data/foo" #noop
- kv version == "v1":
- provider_path: nil
- input: "secret/path/foo"
- output: "secret/path/foo" #noop
- */
- func (v *client) buildPath(path string) string {
- optionalMount := v.store.Path
- out := path
- // if optionalMount is Set, remove it from path if its there
- if optionalMount != nil {
- cut := *optionalMount + "/"
- if strings.HasPrefix(out, cut) {
- // This current logic induces a bug when the actual secret resides on same path names as the mount path.
- _, out, _ = strings.Cut(out, cut)
- // if data succeeds optionalMount on v2 store, we should remove it as well
- if strings.HasPrefix(out, "data/") && v.store.Version == esv1beta1.VaultKVStoreV2 {
- _, out, _ = strings.Cut(out, "data/")
- }
- }
- buildPath := strings.Split(out, "/")
- buildMount := strings.Split(*optionalMount, "/")
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- buildMount = append(buildMount, "data")
- }
- buildMount = append(buildMount, buildPath...)
- out = strings.Join(buildMount, "/")
- return out
- }
- if !strings.Contains(out, "/data/") && v.store.Version == esv1beta1.VaultKVStoreV2 {
- buildPath := strings.Split(out, "/")
- buildMount := []string{buildPath[0], "data"}
- buildMount = append(buildMount, buildPath[1:]...)
- out = strings.Join(buildMount, "/")
- return out
- }
- return out
- }
- func (v *client) readSecret(ctx context.Context, path, version string) (map[string]interface{}, error) {
- dataPath := v.buildPath(path)
- // path formated according to vault docs for v1 and v2 API
- // v1: https://www.vaultproject.io/api-docs/secret/kv/kv-v1#read-secret
- // v2: https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
- var params map[string][]string
- if version != "" {
- params = make(map[string][]string)
- params["version"] = []string{version}
- }
- vaultSecret, err := v.logical.ReadWithDataWithContext(ctx, dataPath, params)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultReadSecretData, err)
- if err != nil {
- return nil, fmt.Errorf(errReadSecret, err)
- }
- if vaultSecret == nil {
- return nil, esv1beta1.NoSecretError{}
- }
- secretData := vaultSecret.Data
- if v.store.Version == esv1beta1.VaultKVStoreV2 {
- // Vault KV2 has data embedded within sub-field
- // reference - https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
- dataInt, ok := vaultSecret.Data["data"]
- if !ok {
- return nil, errors.New(errDataField)
- }
- if dataInt == nil {
- return nil, esv1beta1.NoSecretError{}
- }
- secretData, ok = dataInt.(map[string]interface{})
- if !ok {
- return nil, errors.New(errJSONUnmarshall)
- }
- }
- return secretData, nil
- }
- func (v *client) newConfig() (*vault.Config, error) {
- cfg := vault.DefaultConfig()
- cfg.Address = v.store.Server
- if len(v.store.CABundle) == 0 && v.store.CAProvider == nil {
- return cfg, nil
- }
- caCertPool := x509.NewCertPool()
- if len(v.store.CABundle) > 0 {
- ok := caCertPool.AppendCertsFromPEM(v.store.CABundle)
- if !ok {
- return nil, fmt.Errorf(errVaultCert, errors.New("failed to parse certificates from CertPool"))
- }
- }
- if v.store.CAProvider != nil && v.storeKind == esv1beta1.ClusterSecretStoreKind && v.store.CAProvider.Namespace == nil {
- return nil, errors.New(errCANamespace)
- }
- if v.store.CAProvider != nil {
- var cert []byte
- var err error
- switch v.store.CAProvider.Type {
- case esv1beta1.CAProviderTypeSecret:
- cert, err = getCertFromSecret(v)
- case esv1beta1.CAProviderTypeConfigMap:
- cert, err = getCertFromConfigMap(v)
- default:
- return nil, errors.New(errUnknownCAProvider)
- }
- if err != nil {
- return nil, err
- }
- ok := caCertPool.AppendCertsFromPEM(cert)
- if !ok {
- return nil, fmt.Errorf(errVaultCert, errors.New("failed to parse certificates from CertPool"))
- }
- }
- if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
- transport.TLSClientConfig.RootCAs = caCertPool
- }
- // If either read-after-write consistency feature is enabled, enable ReadYourWrites
- cfg.ReadYourWrites = v.store.ReadYourWrites || v.store.ForwardInconsistent
- return cfg, nil
- }
- func getCertFromSecret(v *client) ([]byte, error) {
- secretRef := esmeta.SecretKeySelector{
- Name: v.store.CAProvider.Name,
- Namespace: &v.namespace,
- Key: v.store.CAProvider.Key,
- }
- if v.store.CAProvider.Namespace != nil {
- secretRef.Namespace = v.store.CAProvider.Namespace
- }
- ctx := context.Background()
- res, err := v.secretKeyRef(ctx, &secretRef)
- if err != nil {
- return nil, fmt.Errorf(errVaultCert, err)
- }
- return []byte(res), nil
- }
- func getCertFromConfigMap(v *client) ([]byte, error) {
- objKey := types.NamespacedName{
- Name: v.store.CAProvider.Name,
- Namespace: v.namespace,
- }
- if v.store.CAProvider.Namespace != nil {
- objKey.Namespace = *v.store.CAProvider.Namespace
- }
- configMapRef := &corev1.ConfigMap{}
- ctx := context.Background()
- err := v.kube.Get(ctx, objKey, configMapRef)
- if err != nil {
- return nil, fmt.Errorf(errVaultCert, err)
- }
- val, ok := configMapRef.Data[v.store.CAProvider.Key]
- if !ok {
- return nil, fmt.Errorf(errConfigMapFmt, v.store.CAProvider.Key)
- }
- return []byte(val), nil
- }
- /*
- setAuth gets a new token using the configured mechanism.
- If there's already a valid token, does nothing.
- */
- func (v *client) setAuth(ctx context.Context, cfg *vault.Config) error {
- tokenExists := false
- var err error
- if v.client.Token() != "" {
- tokenExists, err = checkToken(ctx, v.token)
- }
- if tokenExists {
- v.log.V(1).Info("Re-using existing token")
- return err
- }
- tokenExists, err = setSecretKeyToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Set token from secret")
- return err
- }
- tokenExists, err = setAppRoleToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using AppRole auth")
- return err
- }
- tokenExists, err = setKubernetesAuthToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using Kubernetes auth")
- return err
- }
- tokenExists, err = setLdapAuthToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using LDAP auth")
- return err
- }
- tokenExists, err = setUserPassAuthToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using userPass auth")
- return err
- }
- tokenExists, err = setJwtAuthToken(ctx, v)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using JWT auth")
- return err
- }
- tokenExists, err = setCertAuthToken(ctx, v, cfg)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using certificate auth")
- return err
- }
- tokenExists, err = setIamAuthToken(ctx, v, vaultiamauth.DefaultJWTProvider, vaultiamauth.DefaultSTSProvider)
- if tokenExists {
- v.log.V(1).Info("Retrieved new token using IAM auth")
- return err
- }
- return errors.New(errAuthFormat)
- }
- func setSecretKeyToken(ctx context.Context, v *client) (bool, error) {
- tokenRef := v.store.Auth.TokenSecretRef
- if tokenRef != nil {
- token, err := v.secretKeyRef(ctx, tokenRef)
- if err != nil {
- return true, err
- }
- v.client.SetToken(token)
- return true, nil
- }
- return false, nil
- }
- func setAppRoleToken(ctx context.Context, v *client) (bool, error) {
- appRole := v.store.Auth.AppRole
- if appRole != nil {
- err := v.requestTokenWithAppRoleRef(ctx, appRole)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setKubernetesAuthToken(ctx context.Context, v *client) (bool, error) {
- kubernetesAuth := v.store.Auth.Kubernetes
- if kubernetesAuth != nil {
- err := v.requestTokenWithKubernetesAuth(ctx, kubernetesAuth)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setLdapAuthToken(ctx context.Context, v *client) (bool, error) {
- ldapAuth := v.store.Auth.Ldap
- if ldapAuth != nil {
- err := v.requestTokenWithLdapAuth(ctx, ldapAuth)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setUserPassAuthToken(ctx context.Context, v *client) (bool, error) {
- userPassAuth := v.store.Auth.UserPass
- if userPassAuth != nil {
- err := v.requestTokenWithUserPassAuth(ctx, userPassAuth)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setJwtAuthToken(ctx context.Context, v *client) (bool, error) {
- jwtAuth := v.store.Auth.Jwt
- if jwtAuth != nil {
- err := v.requestTokenWithJwtAuth(ctx, jwtAuth)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setCertAuthToken(ctx context.Context, v *client, cfg *vault.Config) (bool, error) {
- certAuth := v.store.Auth.Cert
- if certAuth != nil {
- err := v.requestTokenWithCertAuth(ctx, certAuth, cfg)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func setIamAuthToken(ctx context.Context, v *client, jwtProvider util.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) (bool, error) {
- iamAuth := v.store.Auth.Iam
- isClusterKind := v.storeKind == esv1beta1.ClusterSecretStoreKind
- if iamAuth != nil {
- err := v.requestTokenWithIamAuth(ctx, iamAuth, isClusterKind, v.kube, v.namespace, jwtProvider, assumeRoler)
- if err != nil {
- return true, err
- }
- return true, nil
- }
- return false, nil
- }
- func (v *client) secretKeyRefForServiceAccount(ctx context.Context, serviceAccountRef *esmeta.ServiceAccountSelector) (string, error) {
- serviceAccount := &corev1.ServiceAccount{}
- ref := types.NamespacedName{
- Namespace: v.namespace,
- Name: serviceAccountRef.Name,
- }
- if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
- (serviceAccountRef.Namespace != nil) {
- ref.Namespace = *serviceAccountRef.Namespace
- }
- err := v.kube.Get(ctx, ref, serviceAccount)
- if err != nil {
- return "", fmt.Errorf(errGetKubeSA, ref.Name, err)
- }
- if len(serviceAccount.Secrets) == 0 {
- return "", fmt.Errorf(errGetKubeSASecrets, ref.Name)
- }
- for _, tokenRef := range serviceAccount.Secrets {
- retval, err := v.secretKeyRef(ctx, &esmeta.SecretKeySelector{
- Name: tokenRef.Name,
- Namespace: &ref.Namespace,
- Key: "token",
- })
- if err != nil {
- continue
- }
- return retval, nil
- }
- return "", fmt.Errorf(errGetKubeSANoToken, ref.Name)
- }
- func (v *client) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
- secret := &corev1.Secret{}
- ref := types.NamespacedName{
- Namespace: v.namespace,
- Name: secretRef.Name,
- }
- if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
- (secretRef.Namespace != nil) {
- ref.Namespace = *secretRef.Namespace
- }
- err := v.kube.Get(ctx, ref, secret)
- if err != nil {
- return "", fmt.Errorf(errGetKubeSecret, ref.Name, err)
- }
- keyBytes, ok := secret.Data[secretRef.Key]
- if !ok {
- return "", fmt.Errorf(errSecretKeyFmt, secretRef.Key)
- }
- value := string(keyBytes)
- valueStr := strings.TrimSpace(value)
- return valueStr, nil
- }
- func (v *client) serviceAccountToken(ctx context.Context, serviceAccountRef esmeta.ServiceAccountSelector, additionalAud []string, expirationSeconds int64) (string, error) {
- audiences := serviceAccountRef.Audiences
- if len(additionalAud) > 0 {
- audiences = append(audiences, additionalAud...)
- }
- tokenRequest := &authenticationv1.TokenRequest{
- ObjectMeta: metav1.ObjectMeta{
- Namespace: v.namespace,
- },
- Spec: authenticationv1.TokenRequestSpec{
- Audiences: audiences,
- ExpirationSeconds: &expirationSeconds,
- },
- }
- if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
- (serviceAccountRef.Namespace != nil) {
- tokenRequest.Namespace = *serviceAccountRef.Namespace
- }
- tokenResponse, err := v.corev1.ServiceAccounts(tokenRequest.Namespace).CreateToken(ctx, serviceAccountRef.Name, tokenRequest, metav1.CreateOptions{})
- if err != nil {
- return "", fmt.Errorf(errGetKubeSATokenRequest, serviceAccountRef.Name, err)
- }
- return tokenResponse.Status.Token, nil
- }
- // checkToken does a lookup and checks if the provided token exists.
- func checkToken(ctx context.Context, token util.Token) (bool, error) {
- // https://www.vaultproject.io/api-docs/auth/token#lookup-a-token-self
- resp, err := token.LookupSelfWithContext(ctx)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLookupSelf, err)
- if err != nil {
- return false, err
- }
- t, ok := resp.Data["type"]
- if !ok {
- return false, fmt.Errorf("could not assert token type")
- }
- tokenType := t.(string)
- if tokenType == "batch" {
- return false, nil
- }
- return true, nil
- }
- func revokeTokenIfValid(ctx context.Context, client util.Client) error {
- valid, err := checkToken(ctx, client.AuthToken())
- if err != nil {
- return fmt.Errorf(errVaultRevokeToken, err)
- }
- if valid {
- err = client.AuthToken().RevokeSelfWithContext(ctx, client.Token())
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultRevokeSelf, err)
- if err != nil {
- return fmt.Errorf(errVaultRevokeToken, err)
- }
- client.ClearToken()
- }
- return nil
- }
- func (v *client) requestTokenWithAppRoleRef(ctx context.Context, appRole *esv1beta1.VaultAppRole) error {
- var err error
- var roleID string // becomes the RoleID used to authenticate with HashiCorp Vault
- // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
- if appRole.RoleID != "" { // use roleId from CRD, if configured
- roleID = strings.TrimSpace(appRole.RoleID)
- } else if appRole.RoleRef != nil { // use RoleID from Secret, if configured
- roleID, err = v.secretKeyRef(ctx, appRole.RoleRef)
- if err != nil {
- return err
- }
- } else { // we ran out of ways to get RoleID. return an appropriate error
- return fmt.Errorf(errInvalidAppRoleID)
- }
- secretID, err := v.secretKeyRef(ctx, &appRole.SecretRef)
- if err != nil {
- return err
- }
- secret := approle.SecretID{FromString: secretID}
- appRoleClient, err := approle.NewAppRoleAuth(roleID, &secret, approle.WithMountPath(appRole.Path))
- if err != nil {
- return err
- }
- _, err = v.auth.Login(ctx, appRoleClient)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
- if err != nil {
- return err
- }
- return nil
- }
- func (v *client) requestTokenWithKubernetesAuth(ctx context.Context, kubernetesAuth *esv1beta1.VaultKubernetesAuth) error {
- jwtString, err := getJwtString(ctx, v, kubernetesAuth)
- if err != nil {
- return err
- }
- k, err := authkubernetes.NewKubernetesAuth(kubernetesAuth.Role, authkubernetes.WithServiceAccountToken(jwtString), authkubernetes.WithMountPath(kubernetesAuth.Path))
- if err != nil {
- return err
- }
- _, err = v.auth.Login(ctx, k)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
- if err != nil {
- return err
- }
- return nil
- }
- func getJwtString(ctx context.Context, v *client, kubernetesAuth *esv1beta1.VaultKubernetesAuth) (string, error) {
- if kubernetesAuth.ServiceAccountRef != nil {
- // Kubernetes <v1.24 fetch token via ServiceAccount.Secrets[]
- // this behavior was removed in v1.24 and we must use TokenRequest API (see below)
- jwt, err := v.secretKeyRefForServiceAccount(ctx, kubernetesAuth.ServiceAccountRef)
- if jwt != "" {
- return jwt, err
- }
- if err != nil {
- v.log.V(1).Info("unable to fetch jwt from service account secret, trying service account token next")
- }
- // Kubernetes >=v1.24: fetch token via TokenRequest API
- // note: this is a massive change from vault perspective: the `iss` claim will very likely change.
- // Vault 1.9 deprecated issuer validation by default, and authentication with Vault clusters <1.9 will likely fail.
- jwt, err = v.serviceAccountToken(ctx, *kubernetesAuth.ServiceAccountRef, nil, 600)
- if err != nil {
- return "", err
- }
- return jwt, nil
- } else if kubernetesAuth.SecretRef != nil {
- tokenRef := kubernetesAuth.SecretRef
- if tokenRef.Key == "" {
- tokenRef = kubernetesAuth.SecretRef.DeepCopy()
- tokenRef.Key = "token"
- }
- jwt, err := v.secretKeyRef(ctx, tokenRef)
- if err != nil {
- return "", err
- }
- return jwt, nil
- } else {
- // Kubernetes authentication is specified, but without a referenced
- // Kubernetes secret. We check if the file path for in-cluster service account
- // exists and attempt to use the token for Vault Kubernetes auth.
- if _, err := os.Stat(serviceAccTokenPath); err != nil {
- return "", fmt.Errorf(errServiceAccount, err)
- }
- jwtByte, err := os.ReadFile(serviceAccTokenPath)
- if err != nil {
- return "", fmt.Errorf(errServiceAccount, err)
- }
- return string(jwtByte), nil
- }
- }
- func (v *client) requestTokenWithLdapAuth(ctx context.Context, ldapAuth *esv1beta1.VaultLdapAuth) error {
- username := strings.TrimSpace(ldapAuth.Username)
- password, err := v.secretKeyRef(ctx, &ldapAuth.SecretRef)
- if err != nil {
- return err
- }
- pass := authldap.Password{FromString: password}
- l, err := authldap.NewLDAPAuth(username, &pass, authldap.WithMountPath(ldapAuth.Path))
- if err != nil {
- return err
- }
- _, err = v.auth.Login(ctx, l)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
- if err != nil {
- return err
- }
- return nil
- }
- func (v *client) requestTokenWithUserPassAuth(ctx context.Context, userPassAuth *esv1beta1.VaultUserPassAuth) error {
- username := strings.TrimSpace(userPassAuth.Username)
- password, err := v.secretKeyRef(ctx, &userPassAuth.SecretRef)
- if err != nil {
- return err
- }
- pass := authuserpass.Password{FromString: password}
- l, err := authuserpass.NewUserpassAuth(username, &pass, authuserpass.WithMountPath(userPassAuth.Path))
- if err != nil {
- return err
- }
- _, err = v.auth.Login(ctx, l)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
- if err != nil {
- return err
- }
- return nil
- }
- func (v *client) requestTokenWithJwtAuth(ctx context.Context, jwtAuth *esv1beta1.VaultJwtAuth) error {
- role := strings.TrimSpace(jwtAuth.Role)
- var jwt string
- var err error
- if jwtAuth.SecretRef != nil {
- jwt, err = v.secretKeyRef(ctx, jwtAuth.SecretRef)
- } else if k8sServiceAccountToken := jwtAuth.KubernetesServiceAccountToken; k8sServiceAccountToken != nil {
- audiences := k8sServiceAccountToken.Audiences
- if audiences == nil {
- audiences = &[]string{"vault"}
- }
- expirationSeconds := k8sServiceAccountToken.ExpirationSeconds
- if expirationSeconds == nil {
- tmp := int64(600)
- expirationSeconds = &tmp
- }
- jwt, err = v.serviceAccountToken(ctx, k8sServiceAccountToken.ServiceAccountRef, *audiences, *expirationSeconds)
- } else {
- err = fmt.Errorf(errJwtNoTokenSource)
- }
- if err != nil {
- return err
- }
- parameters := map[string]interface{}{
- "role": role,
- "jwt": jwt,
- }
- url := strings.Join([]string{"auth", jwtAuth.Path, "login"}, "/")
- vaultResult, err := v.logical.WriteWithContext(ctx, url, parameters)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
- if err != nil {
- return err
- }
- token, err := vaultResult.TokenID()
- if err != nil {
- return fmt.Errorf(errVaultToken, err)
- }
- v.client.SetToken(token)
- return nil
- }
- func (v *client) requestTokenWithCertAuth(ctx context.Context, certAuth *esv1beta1.VaultCertAuth, cfg *vault.Config) error {
- clientKey, err := v.secretKeyRef(ctx, &certAuth.SecretRef)
- if err != nil {
- return err
- }
- clientCert, err := v.secretKeyRef(ctx, &certAuth.ClientCert)
- if err != nil {
- return err
- }
- cert, err := tls.X509KeyPair([]byte(clientCert), []byte(clientKey))
- if err != nil {
- return fmt.Errorf(errClientTLSAuth, err)
- }
- if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
- transport.TLSClientConfig.Certificates = []tls.Certificate{cert}
- }
- url := strings.Join([]string{"auth", "cert", "login"}, "/")
- vaultResult, err := v.logical.WriteWithContext(ctx, url, nil)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
- if err != nil {
- return fmt.Errorf(errVaultRequest, err)
- }
- token, err := vaultResult.TokenID()
- if err != nil {
- return fmt.Errorf(errVaultToken, err)
- }
- v.client.SetToken(token)
- return nil
- }
- func (v *client) requestTokenWithIamAuth(ctx context.Context, iamAuth *esv1beta1.VaultIamAuth, ick bool, k kclient.Client, n string, jwtProvider util.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) error {
- jwtAuth := iamAuth.JWTAuth
- secretRefAuth := iamAuth.SecretRef
- regionAWS := defaultAWSRegion
- awsAuthMountPath := defaultAWSAuthMountPath
- if iamAuth.Region != "" {
- regionAWS = iamAuth.Region
- }
- if iamAuth.Path != "" {
- awsAuthMountPath = iamAuth.Path
- }
- var creds *credentials.Credentials
- var err error
- if jwtAuth != nil { // use credentials from a sa explicitly defined and referenced. Highest preference is given to this method/configuration.
- creds, err = vaultiamauth.CredsFromServiceAccount(ctx, *iamAuth, regionAWS, ick, k, n, jwtProvider)
- if err != nil {
- return err
- }
- } else if secretRefAuth != nil { // if jwtAuth is not defined, check if secretRef is defined. Second preference.
- logger.V(1).Info("using credentials from secretRef")
- creds, err = vaultiamauth.CredsFromSecretRef(ctx, *iamAuth, ick, k, n)
- if err != nil {
- return err
- }
- }
- // Neither of jwtAuth or secretRefAuth defined. Last preference.
- // Default to controller pod's identity
- if jwtAuth == nil && secretRefAuth == nil {
- // Checking if controller pod's service account is IRSA enabled and Web Identity token is available on pod
- tknFile, tknFileEnvVarPresent := os.LookupEnv(vaultiamauth.AWSWebIdentityTokenFileEnvVar)
- if !tknFileEnvVarPresent {
- return fmt.Errorf(errIrsaTokenEnvVarNotFoundOnPod, vaultiamauth.AWSWebIdentityTokenFileEnvVar) // No Web Identity(IRSA) token found on pod
- }
- // IRSA enabled service account, let's check that the jwt token filemount and file exists
- if _, err := os.Stat(tknFile); err != nil {
- return fmt.Errorf(errIrsaTokenFileNotFoundOnPod, tknFile, err)
- }
- // everything looks good so far, let's fetch the jwt token from AWS_WEB_IDENTITY_TOKEN_FILE
- jwtByte, err := os.ReadFile(tknFile)
- if err != nil {
- return fmt.Errorf(errIrsaTokenFileNotReadable, tknFile, err)
- }
- // let's parse the jwt token
- parser := jwt.NewParser(jwt.WithoutClaimsValidation())
- token, _, err := parser.ParseUnverified(string(jwtByte), jwt.MapClaims{})
- if err != nil {
- return fmt.Errorf(errIrsaTokenNotValidJWT, tknFile, err) // JWT token parser error
- }
- var ns string
- var sa string
- // let's fetch the namespace and serviceaccount from parsed jwt token
- if claims, ok := token.Claims.(jwt.MapClaims); ok {
- ns = claims["kubernetes.io"].(map[string]interface{})["namespace"].(string)
- sa = claims["kubernetes.io"].(map[string]interface{})["serviceaccount"].(map[string]interface{})["name"].(string)
- } else {
- return fmt.Errorf(errPodInfoNotFoundOnToken, tknFile, err)
- }
- creds, err = vaultiamauth.CredsFromControllerServiceAccount(ctx, sa, ns, regionAWS, k, jwtProvider)
- if err != nil {
- return err
- }
- }
- config := aws.NewConfig().WithEndpointResolver(vaultiamauth.ResolveEndpoint())
- if creds != nil {
- config.WithCredentials(creds)
- }
- if regionAWS != "" {
- config.WithRegion(regionAWS)
- }
- sess, err := vaultiamauth.GetAWSSession(config)
- if err != nil {
- return err
- }
- if iamAuth.AWSIAMRole != "" {
- stsclient := assumeRoler(sess)
- if iamAuth.ExternalID != "" {
- var setExternalID = func(p *stscreds.AssumeRoleProvider) {
- p.ExternalID = aws.String(iamAuth.ExternalID)
- }
- sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole, setExternalID))
- } else {
- sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole))
- }
- }
- getCreds, err := sess.Config.Credentials.Get()
- if err != nil {
- return err
- }
- // Set environment variables. These would be fetched by Login
- os.Setenv("AWS_ACCESS_KEY_ID", getCreds.AccessKeyID)
- os.Setenv("AWS_SECRET_ACCESS_KEY", getCreds.SecretAccessKey)
- os.Setenv("AWS_SESSION_TOKEN", getCreds.SessionToken)
- var awsAuthClient *authaws.AWSAuth
- if iamAuth.VaultAWSIAMServerID != "" {
- awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath), authaws.WithIAMServerIDHeader(iamAuth.VaultAWSIAMServerID))
- if err != nil {
- return err
- }
- } else {
- awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath))
- if err != nil {
- return err
- }
- }
- _, err = v.auth.Login(ctx, awsAuthClient)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
- if err != nil {
- return err
- }
- return nil
- }
- func init() {
- var vaultTokenCacheSize int
- fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
- fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
- // max. 265k vault leases with 30bytes each ~= 7MB
- fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", 2<<17, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
- lateInit := func() {
- logger.Info("initializing vault cache", "size", vaultTokenCacheSize)
- clientCache = cache.Must(vaultTokenCacheSize, func(client util.Client) {
- err := revokeTokenIfValid(context.Background(), client)
- if err != nil {
- logger.Error(err, "unable to revoke cached token on eviction")
- }
- })
- }
- feature.Register(feature.Feature{
- Flags: fs,
- Initialize: lateInit,
- })
- esv1beta1.Register(&Connector{
- NewVaultClient: NewVaultClient,
- }, &esv1beta1.SecretStoreProvider{
- Vault: &esv1beta1.VaultProvider{},
- })
- }
|