akeyless.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "net/url"
  22. "strconv"
  23. "strings"
  24. "time"
  25. "github.com/akeylesslabs/akeyless-go/v3"
  26. "github.com/tidwall/gjson"
  27. corev1 "k8s.io/api/core/v1"
  28. "k8s.io/client-go/kubernetes"
  29. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  30. "sigs.k8s.io/controller-runtime/pkg/client"
  31. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  32. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  33. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  34. "github.com/external-secrets/external-secrets/pkg/find"
  35. "github.com/external-secrets/external-secrets/pkg/utils"
  36. )
  37. const (
  38. defaultAPIUrl = "https://api.akeyless.io"
  39. errNotImplemented = "not implemented"
  40. )
  41. // https://github.com/external-secrets/external-secrets/issues/644
  42. var _ esv1beta1.SecretsClient = &Akeyless{}
  43. var _ esv1beta1.Provider = &Provider{}
  44. // Provider satisfies the provider interface.
  45. type Provider struct{}
  46. // akeylessBase satisfies the provider.SecretsClient interface.
  47. type akeylessBase struct {
  48. kube client.Client
  49. store esv1beta1.GenericStore
  50. storeKind string
  51. corev1 typedcorev1.CoreV1Interface
  52. namespace string
  53. akeylessGwAPIURL string
  54. RestAPI *akeyless.V2ApiService
  55. }
  56. type Akeyless struct {
  57. Client akeylessVaultInterface
  58. url string
  59. }
  60. type Item struct {
  61. ItemName string `json:"item_name"`
  62. ItemType string `json:"item_type"`
  63. LastVersion int32 `json:"last_version"`
  64. }
  65. type akeylessVaultInterface interface {
  66. GetSecretByType(ctx context.Context, secretName, token string, version int32) (string, error)
  67. TokenFromSecretRef(ctx context.Context) (string, error)
  68. ListSecrets(ctx context.Context, path, tag, token string) ([]string, error)
  69. }
  70. func init() {
  71. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  72. Akeyless: &esv1beta1.AkeylessProvider{},
  73. })
  74. }
  75. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  76. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  77. return esv1beta1.SecretStoreReadOnly
  78. }
  79. // NewClient constructs a new secrets client based on the provided store.
  80. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  81. // controller-runtime/client does not support TokenRequest or other subresource APIs
  82. // so we need to construct our own client and use it to fetch tokens
  83. // (for Kubernetes service account token auth)
  84. restCfg, err := ctrlcfg.GetConfig()
  85. if err != nil {
  86. return nil, err
  87. }
  88. clientset, err := kubernetes.NewForConfig(restCfg)
  89. if err != nil {
  90. return nil, err
  91. }
  92. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  93. }
  94. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  95. storeSpec := store.GetSpec()
  96. akeylessSpec := storeSpec.Provider.Akeyless
  97. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  98. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  99. url, err := url.Parse(*akeylessGWApiURL)
  100. if err != nil {
  101. return nil, errors.New(errInvalidAkeylessURL)
  102. }
  103. if url.Host == "" {
  104. return nil, errors.New(errInvalidAkeylessURL)
  105. }
  106. }
  107. if akeylessSpec.Auth.KubernetesAuth != nil {
  108. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  109. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  110. return nil, fmt.Errorf(errInvalidKubeSA, err)
  111. }
  112. }
  113. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  114. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  115. if err != nil {
  116. return nil, err
  117. }
  118. }
  119. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  120. return nil, errors.New("missing kubernetes auth-method access-id")
  121. }
  122. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  123. return nil, errors.New("missing kubernetes config name")
  124. }
  125. return nil, nil
  126. }
  127. accessID := akeylessSpec.Auth.SecretRef.AccessID
  128. err := utils.ValidateSecretSelector(store, accessID)
  129. if err != nil {
  130. return nil, err
  131. }
  132. if accessID.Name == "" {
  133. return nil, errors.New(errInvalidAkeylessAccessIDName)
  134. }
  135. if accessID.Key == "" {
  136. return nil, errors.New(errInvalidAkeylessAccessIDKey)
  137. }
  138. accessType := akeylessSpec.Auth.SecretRef.AccessType
  139. err = utils.ValidateSecretSelector(store, accessType)
  140. if err != nil {
  141. return nil, err
  142. }
  143. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  144. err = utils.ValidateSecretSelector(store, accessTypeParam)
  145. if err != nil {
  146. return nil, err
  147. }
  148. return nil, nil
  149. }
  150. func newClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  151. akl := &akeylessBase{
  152. kube: kube,
  153. store: store,
  154. namespace: namespace,
  155. corev1: corev1,
  156. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  157. }
  158. spec, err := GetAKeylessProvider(store)
  159. if err != nil {
  160. return nil, err
  161. }
  162. akeylessGwAPIURL := defaultAPIUrl
  163. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  164. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  165. }
  166. if spec.Auth == nil {
  167. return nil, errors.New("missing Auth in store config")
  168. }
  169. client, err := akl.getAkeylessHTTPClient(ctx, spec)
  170. if err != nil {
  171. return nil, err
  172. }
  173. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  174. HTTPClient: client,
  175. Servers: []akeyless.ServerConfiguration{
  176. {
  177. URL: akeylessGwAPIURL,
  178. },
  179. },
  180. }).V2Api
  181. akl.akeylessGwAPIURL = akeylessGwAPIURL
  182. akl.RestAPI = RestAPIClient
  183. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  184. }
  185. func (a *Akeyless) Close(_ context.Context) error {
  186. return nil
  187. }
  188. func (a *Akeyless) Validate() (esv1beta1.ValidationResult, error) {
  189. timeout := 15 * time.Second
  190. url := a.url
  191. if err := utils.NetworkValidate(url, timeout); err != nil {
  192. return esv1beta1.ValidationResultError, err
  193. }
  194. return esv1beta1.ValidationResultReady, nil
  195. }
  196. func (a *Akeyless) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  197. return errors.New(errNotImplemented)
  198. }
  199. func (a *Akeyless) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  200. return errors.New(errNotImplemented)
  201. }
  202. func (a *Akeyless) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  203. return false, errors.New(errNotImplemented)
  204. }
  205. // Implements store.Client.GetSecret Interface.
  206. // Retrieves a secret with the secret name defined in ref.Name.
  207. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  208. if utils.IsNil(a.Client) {
  209. return nil, errors.New(errUninitalizedAkeylessProvider)
  210. }
  211. token, err := a.Client.TokenFromSecretRef(ctx)
  212. if err != nil {
  213. return nil, err
  214. }
  215. version := int32(0)
  216. if ref.Version != "" {
  217. i, err := strconv.ParseInt(ref.Version, 10, 32)
  218. if err == nil {
  219. version = int32(i)
  220. }
  221. }
  222. value, err := a.Client.GetSecretByType(ctx, ref.Key, token, version)
  223. if err != nil {
  224. return nil, err
  225. }
  226. if ref.Property == "" {
  227. if value != "" {
  228. return []byte(value), nil
  229. }
  230. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  231. }
  232. // We need to search if a given key with a . exists before using gjson operations.
  233. idx := strings.Index(ref.Property, ".")
  234. if idx > -1 {
  235. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  236. val := gjson.Get(value, refProperty)
  237. if val.Exists() {
  238. return []byte(val.String()), nil
  239. }
  240. }
  241. val := gjson.Get(value, ref.Property)
  242. if !val.Exists() {
  243. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  244. }
  245. return []byte(val.String()), nil
  246. }
  247. // Implements store.Client.GetAllSecrets Interface.
  248. // Retrieves a all secrets with defined in ref.Name or tags.
  249. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  250. if utils.IsNil(a.Client) {
  251. return nil, errors.New(errUninitalizedAkeylessProvider)
  252. }
  253. searchPath := ""
  254. if ref.Path != nil {
  255. searchPath = *ref.Path
  256. if !strings.HasPrefix(searchPath, "/") {
  257. searchPath = "/" + searchPath
  258. }
  259. if !strings.HasSuffix(searchPath, "/") {
  260. searchPath += "/"
  261. }
  262. }
  263. token, err := a.Client.TokenFromSecretRef(ctx)
  264. if err != nil {
  265. return nil, err
  266. }
  267. if ref.Name != nil {
  268. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "", token)
  269. if err != nil {
  270. return nil, err
  271. }
  272. if len(potentialSecrets) == 0 {
  273. return nil, nil
  274. }
  275. return a.findSecretsFromName(ctx, potentialSecrets, *ref.Name, token)
  276. }
  277. if len(ref.Tags) > 0 {
  278. var potentialSecretsName []string
  279. for _, v := range ref.Tags {
  280. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v, token)
  281. if err != nil {
  282. return nil, err
  283. }
  284. if len(potentialSecrets) > 0 {
  285. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  286. }
  287. }
  288. if len(potentialSecretsName) == 0 {
  289. return nil, nil
  290. }
  291. return a.getSecrets(ctx, potentialSecretsName, token)
  292. }
  293. return nil, errors.New("unexpected find operator")
  294. }
  295. func (a *Akeyless) getSecrets(ctx context.Context, candidates []string, token string) (map[string][]byte, error) {
  296. secrets := make(map[string][]byte)
  297. for _, name := range candidates {
  298. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  299. if err != nil {
  300. return nil, err
  301. }
  302. if secretValue != "" {
  303. secrets[name] = []byte(secretValue)
  304. }
  305. }
  306. return secrets, nil
  307. }
  308. func (a *Akeyless) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName, token string) (map[string][]byte, error) {
  309. secrets := make(map[string][]byte)
  310. matcher, err := find.New(ref)
  311. if err != nil {
  312. return nil, err
  313. }
  314. for _, name := range candidates {
  315. ok := matcher.MatchName(name)
  316. if ok {
  317. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  318. if err != nil {
  319. return nil, err
  320. }
  321. if secretValue != "" {
  322. secrets[name] = []byte(secretValue)
  323. }
  324. }
  325. }
  326. return secrets, nil
  327. }
  328. // Implements store.Client.GetSecretMap Interface.
  329. // New version of GetSecretMap.
  330. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  331. if utils.IsNil(a.Client) {
  332. return nil, errors.New(errUninitalizedAkeylessProvider)
  333. }
  334. val, err := a.GetSecret(ctx, ref)
  335. if err != nil {
  336. return nil, err
  337. }
  338. // Maps the json data to a string:string map
  339. kv := make(map[string]string)
  340. err = json.Unmarshal(val, &kv)
  341. if err != nil {
  342. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  343. }
  344. // Converts values in K:V pairs into bytes, while leaving keys as strings
  345. secretData := make(map[string][]byte)
  346. for k, v := range kv {
  347. secretData[k] = []byte(v)
  348. }
  349. return secretData, nil
  350. }
  351. func (a *akeylessBase) getAkeylessHTTPClient(ctx context.Context, provider *esv1beta1.AkeylessProvider) (*http.Client, error) {
  352. client := &http.Client{Timeout: 30 * time.Second}
  353. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  354. return client, nil
  355. }
  356. cert, err := utils.FetchCACertFromSource(ctx, utils.CreateCertOpts{
  357. StoreKind: a.storeKind,
  358. Client: a.kube,
  359. Namespace: a.namespace,
  360. CABundle: provider.CABundle,
  361. CAProvider: provider.CAProvider,
  362. })
  363. if err != nil {
  364. return nil, err
  365. }
  366. caCertPool := x509.NewCertPool()
  367. ok := caCertPool.AppendCertsFromPEM(cert)
  368. if !ok {
  369. return nil, errors.New("failed to append caBundle")
  370. }
  371. tlsConf := &tls.Config{
  372. RootCAs: caCertPool,
  373. MinVersion: tls.VersionTLS12,
  374. }
  375. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  376. return client, nil
  377. }