keyvault.go 41 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package keyvault
  13. import (
  14. "context"
  15. "crypto/x509"
  16. b64 "encoding/base64"
  17. "encoding/json"
  18. "encoding/pem"
  19. "errors"
  20. "fmt"
  21. "os"
  22. "path"
  23. "regexp"
  24. "strings"
  25. "time"
  26. "github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault"
  27. "github.com/Azure/go-autorest/autorest"
  28. "github.com/Azure/go-autorest/autorest/adal"
  29. "github.com/Azure/go-autorest/autorest/azure"
  30. kvauth "github.com/Azure/go-autorest/autorest/azure/auth"
  31. "github.com/Azure/go-autorest/autorest/date"
  32. "github.com/AzureAD/microsoft-authentication-library-for-go/apps/confidential"
  33. "github.com/lestrrat-go/jwx/v2/jwk"
  34. "github.com/tidwall/gjson"
  35. "golang.org/x/crypto/sha3"
  36. authv1 "k8s.io/api/authentication/v1"
  37. corev1 "k8s.io/api/core/v1"
  38. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  39. "k8s.io/apimachinery/pkg/types"
  40. "k8s.io/client-go/kubernetes"
  41. kcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  42. pointer "k8s.io/utils/ptr"
  43. "sigs.k8s.io/controller-runtime/pkg/client"
  44. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  45. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  46. gopkcs12 "software.sslmate.com/src/go-pkcs12"
  47. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  48. "github.com/external-secrets/external-secrets/pkg/constants"
  49. "github.com/external-secrets/external-secrets/pkg/metrics"
  50. "github.com/external-secrets/external-secrets/pkg/utils"
  51. "github.com/external-secrets/external-secrets/pkg/utils/metadata"
  52. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  53. )
  54. const (
  55. defaultObjType = "secret"
  56. objectTypeCert = "cert"
  57. objectTypeKey = "key"
  58. AzureDefaultAudience = "api://AzureADTokenExchange"
  59. AnnotationClientID = "azure.workload.identity/client-id"
  60. AnnotationTenantID = "azure.workload.identity/tenant-id"
  61. managerLabel = "external-secrets"
  62. errUnexpectedStoreSpec = "unexpected store spec"
  63. errMissingAuthType = "cannot initialize Azure Client: no valid authType was specified"
  64. errPropNotExist = "property %s does not exist in key %s"
  65. errTagNotExist = "tag %s does not exist"
  66. errUnknownObjectType = "unknown Azure Keyvault object Type for %s"
  67. errUnmarshalJSONData = "error unmarshalling json data: %w"
  68. errDataFromCert = "cannot get use dataFrom to get certificate secret"
  69. errDataFromKey = "cannot get use dataFrom to get key secret"
  70. errMissingTenant = "missing tenantID in store config"
  71. errMissingClient = "missing clientID: either serviceAccountRef or service account annotation '%s' is missing"
  72. errMissingSecretRef = "missing secretRef in provider config"
  73. errMissingClientIDSecret = "missing accessKeyID/secretAccessKey in store config"
  74. errInvalidClientCredentials = "both clientSecret and clientCredentials set"
  75. errMultipleClientID = "multiple clientID found. Check secretRef and serviceAccountRef"
  76. errMultipleTenantID = "multiple tenantID found. Check secretRef, 'spec.provider.azurekv.tenantId', and serviceAccountRef"
  77. errInvalidStore = "invalid store"
  78. errInvalidStoreSpec = "invalid store spec"
  79. errInvalidStoreProv = "invalid store provider"
  80. errInvalidAzureProv = "invalid azure keyvault provider"
  81. errInvalidSecRefClientID = "invalid AuthSecretRef.ClientID: %w"
  82. errInvalidSecRefClientSecret = "invalid AuthSecretRef.ClientSecret: %w"
  83. errInvalidSARef = "invalid ServiceAccountRef: %w"
  84. errMissingWorkloadEnvVars = "missing environment variables. AZURE_CLIENT_ID, AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE must be set"
  85. errReadTokenFile = "unable to read token file %s: %w"
  86. )
  87. // https://github.com/external-secrets/external-secrets/issues/644
  88. var _ esv1beta1.SecretsClient = &Azure{}
  89. var _ esv1beta1.Provider = &Azure{}
  90. // interface to keyvault.BaseClient.
  91. type SecretClient interface {
  92. GetKey(ctx context.Context, vaultBaseURL string, keyName string, keyVersion string) (result keyvault.KeyBundle, err error)
  93. GetSecret(ctx context.Context, vaultBaseURL string, secretName string, secretVersion string) (result keyvault.SecretBundle, err error)
  94. GetSecretsComplete(ctx context.Context, vaultBaseURL string, maxresults *int32) (result keyvault.SecretListResultIterator, err error)
  95. GetCertificate(ctx context.Context, vaultBaseURL string, certificateName string, certificateVersion string) (result keyvault.CertificateBundle, err error)
  96. SetSecret(ctx context.Context, vaultBaseURL string, secretName string, parameters keyvault.SecretSetParameters) (result keyvault.SecretBundle, err error)
  97. ImportKey(ctx context.Context, vaultBaseURL string, keyName string, parameters keyvault.KeyImportParameters) (result keyvault.KeyBundle, err error)
  98. ImportCertificate(ctx context.Context, vaultBaseURL string, certificateName string, parameters keyvault.CertificateImportParameters) (result keyvault.CertificateBundle, err error)
  99. DeleteCertificate(ctx context.Context, vaultBaseURL string, certificateName string) (result keyvault.DeletedCertificateBundle, err error)
  100. DeleteKey(ctx context.Context, vaultBaseURL string, keyName string) (result keyvault.DeletedKeyBundle, err error)
  101. DeleteSecret(ctx context.Context, vaultBaseURL string, secretName string) (result keyvault.DeletedSecretBundle, err error)
  102. }
  103. type Azure struct {
  104. crClient client.Client
  105. kubeClient kcorev1.CoreV1Interface
  106. store esv1beta1.GenericStore
  107. provider *esv1beta1.AzureKVProvider
  108. baseClient SecretClient
  109. namespace string
  110. }
  111. type PushSecretMetadataSpec struct {
  112. ExpirationDate string `json:"expirationDate,omitempty"`
  113. }
  114. func init() {
  115. esv1beta1.Register(&Azure{}, &esv1beta1.SecretStoreProvider{
  116. AzureKV: &esv1beta1.AzureKVProvider{},
  117. })
  118. }
  119. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  120. func (a *Azure) Capabilities() esv1beta1.SecretStoreCapabilities {
  121. return esv1beta1.SecretStoreReadWrite
  122. }
  123. // NewClient constructs a new secrets client based on the provided store.
  124. func (a *Azure) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  125. return newClient(ctx, store, kube, namespace)
  126. }
  127. func newClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  128. provider, err := getProvider(store)
  129. if err != nil {
  130. return nil, err
  131. }
  132. cfg, err := ctrlcfg.GetConfig()
  133. if err != nil {
  134. return nil, err
  135. }
  136. kubeClient, err := kubernetes.NewForConfig(cfg)
  137. if err != nil {
  138. return nil, err
  139. }
  140. az := &Azure{
  141. crClient: kube,
  142. kubeClient: kubeClient.CoreV1(),
  143. store: store,
  144. namespace: namespace,
  145. provider: provider,
  146. }
  147. // allow SecretStore controller validation to pass
  148. // when using referent namespace.
  149. if store.GetKind() == esv1beta1.ClusterSecretStoreKind &&
  150. namespace == "" &&
  151. isReferentSpec(provider) {
  152. return az, nil
  153. }
  154. var authorizer autorest.Authorizer
  155. switch *provider.AuthType {
  156. case esv1beta1.AzureManagedIdentity:
  157. authorizer, err = az.authorizerForManagedIdentity()
  158. case esv1beta1.AzureServicePrincipal:
  159. authorizer, err = az.authorizerForServicePrincipal(ctx)
  160. case esv1beta1.AzureWorkloadIdentity:
  161. authorizer, err = az.authorizerForWorkloadIdentity(ctx, NewTokenProvider)
  162. default:
  163. err = errors.New(errMissingAuthType)
  164. }
  165. cl := keyvault.New()
  166. cl.Authorizer = authorizer
  167. az.baseClient = &cl
  168. return az, err
  169. }
  170. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.AzureKVProvider, error) {
  171. spc := store.GetSpec()
  172. if spc == nil || spc.Provider.AzureKV == nil {
  173. return nil, errors.New(errUnexpectedStoreSpec)
  174. }
  175. return spc.Provider.AzureKV, nil
  176. }
  177. func (a *Azure) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  178. if store == nil {
  179. return nil, errors.New(errInvalidStore)
  180. }
  181. spc := store.GetSpec()
  182. if spc == nil {
  183. return nil, errors.New(errInvalidStoreSpec)
  184. }
  185. if spc.Provider == nil {
  186. return nil, errors.New(errInvalidStoreProv)
  187. }
  188. p := spc.Provider.AzureKV
  189. if p == nil {
  190. return nil, errors.New(errInvalidAzureProv)
  191. }
  192. if p.AuthSecretRef != nil {
  193. if p.AuthSecretRef.ClientID != nil {
  194. if err := utils.ValidateReferentSecretSelector(store, *p.AuthSecretRef.ClientID); err != nil {
  195. return nil, fmt.Errorf(errInvalidSecRefClientID, err)
  196. }
  197. }
  198. if p.AuthSecretRef.ClientSecret != nil {
  199. if err := utils.ValidateReferentSecretSelector(store, *p.AuthSecretRef.ClientSecret); err != nil {
  200. return nil, fmt.Errorf(errInvalidSecRefClientSecret, err)
  201. }
  202. }
  203. }
  204. if p.ServiceAccountRef != nil {
  205. if err := utils.ValidateReferentServiceAccountSelector(store, *p.ServiceAccountRef); err != nil {
  206. return nil, fmt.Errorf(errInvalidSARef, err)
  207. }
  208. }
  209. return nil, nil
  210. }
  211. func canDelete(tags map[string]*string, err error) (bool, error) {
  212. aerr := &autorest.DetailedError{}
  213. conv := errors.As(err, aerr)
  214. if err != nil && !conv {
  215. return false, fmt.Errorf("could not parse error: %w", err)
  216. }
  217. if conv && aerr.StatusCode != 404 { // Secret is already deleted, nothing to do.
  218. return false, fmt.Errorf("unexpected api error: %w", err)
  219. }
  220. if aerr.StatusCode == 404 {
  221. return false, nil
  222. }
  223. manager, ok := tags["managed-by"]
  224. if !ok || manager == nil || *manager != managerLabel {
  225. return false, errors.New("not managed by external-secrets")
  226. }
  227. return true, nil
  228. }
  229. func (a *Azure) deleteKeyVaultKey(ctx context.Context, keyName string) error {
  230. value, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, keyName, "")
  231. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  232. ok, err := canDelete(value.Tags, err)
  233. if err != nil {
  234. return fmt.Errorf("error getting key %v: %w", keyName, err)
  235. }
  236. if ok {
  237. _, err = a.baseClient.DeleteKey(ctx, *a.provider.VaultURL, keyName)
  238. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteKey, err)
  239. if err != nil {
  240. return fmt.Errorf("error deleting key %v: %w", keyName, err)
  241. }
  242. }
  243. return nil
  244. }
  245. func (a *Azure) deleteKeyVaultSecret(ctx context.Context, secretName string) error {
  246. value, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  247. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  248. ok, err := canDelete(value.Tags, err)
  249. if err != nil {
  250. return fmt.Errorf("error getting secret %v: %w", secretName, err)
  251. }
  252. if ok {
  253. _, err = a.baseClient.DeleteSecret(ctx, *a.provider.VaultURL, secretName)
  254. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteSecret, err)
  255. if err != nil {
  256. return fmt.Errorf("error deleting secret %v: %w", secretName, err)
  257. }
  258. }
  259. return nil
  260. }
  261. func (a *Azure) deleteKeyVaultCertificate(ctx context.Context, certName string) error {
  262. value, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, certName, "")
  263. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  264. ok, err := canDelete(value.Tags, err)
  265. if err != nil {
  266. return fmt.Errorf("error getting certificate %v: %w", certName, err)
  267. }
  268. if ok {
  269. _, err = a.baseClient.DeleteCertificate(ctx, *a.provider.VaultURL, certName)
  270. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteCertificate, err)
  271. if err != nil {
  272. return fmt.Errorf("error deleting certificate %v: %w", certName, err)
  273. }
  274. }
  275. return nil
  276. }
  277. func (a *Azure) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  278. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: remoteRef.GetRemoteKey()})
  279. switch objectType {
  280. case defaultObjType:
  281. return a.deleteKeyVaultSecret(ctx, secretName)
  282. case objectTypeCert:
  283. return a.deleteKeyVaultCertificate(ctx, secretName)
  284. case objectTypeKey:
  285. return a.deleteKeyVaultKey(ctx, secretName)
  286. default:
  287. return fmt.Errorf("secret type '%v' is not supported", objectType)
  288. }
  289. }
  290. func (a *Azure) SecretExists(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) (bool, error) {
  291. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: remoteRef.GetRemoteKey()})
  292. var err error
  293. switch objectType {
  294. case defaultObjType:
  295. _, err = a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  296. case objectTypeCert:
  297. _, err = a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, "")
  298. case objectTypeKey:
  299. _, err = a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, "")
  300. default:
  301. errMsg := fmt.Sprintf("secret type '%v' is not supported", objectType)
  302. return false, errors.New(errMsg)
  303. }
  304. err = parseError(err)
  305. if err != nil {
  306. var noSecretErr esv1beta1.NoSecretError
  307. if errors.As(err, &noSecretErr) {
  308. return false, nil
  309. }
  310. return false, err
  311. }
  312. return true, nil
  313. }
  314. func getCertificateFromValue(value []byte) (*x509.Certificate, error) {
  315. // 1st: try decode pkcs12
  316. _, localCert, err := gopkcs12.Decode(value, "")
  317. if err == nil {
  318. return localCert, nil
  319. }
  320. // 2nd: try decode pkcs12 with chain
  321. _, localCert, _, err = gopkcs12.DecodeChain(value, "")
  322. if err == nil {
  323. return localCert, nil
  324. }
  325. // 3rd: try DER
  326. localCert, err = x509.ParseCertificate(value)
  327. if err == nil {
  328. return localCert, nil
  329. }
  330. // 4th: parse PEM blocks
  331. for {
  332. block, rest := pem.Decode(value)
  333. value = rest
  334. if block == nil {
  335. break
  336. }
  337. cert, err := x509.ParseCertificate(block.Bytes)
  338. if err == nil {
  339. return cert, nil
  340. }
  341. }
  342. return nil, errors.New("could not parse certificate value as PKCS#12, DER or PEM")
  343. }
  344. func getKeyFromValue(value []byte) (any, error) {
  345. val := value
  346. pemBlock, _ := pem.Decode(value)
  347. // if a private key regular expression doesn't match, we should consider this key to be symmetric
  348. if pemBlock == nil {
  349. return val, nil
  350. }
  351. val = pemBlock.Bytes
  352. switch pemBlock.Type {
  353. case "PRIVATE KEY":
  354. return x509.ParsePKCS8PrivateKey(val)
  355. case "RSA PRIVATE KEY":
  356. return x509.ParsePKCS1PrivateKey(val)
  357. case "EC PRIVATE KEY":
  358. return x509.ParseECPrivateKey(val)
  359. default:
  360. return nil, fmt.Errorf("key type %v is not supported", pemBlock.Type)
  361. }
  362. }
  363. func canCreate(tags map[string]*string, err error) (bool, error) {
  364. aerr := &autorest.DetailedError{}
  365. conv := errors.As(err, aerr)
  366. if err != nil && !conv {
  367. return false, fmt.Errorf("could not parse error: %w", err)
  368. }
  369. if conv && aerr.StatusCode != 404 {
  370. return false, fmt.Errorf("unexpected api error: %w", err)
  371. }
  372. if err == nil {
  373. manager, ok := tags["managed-by"]
  374. if !ok || manager == nil || *manager != managerLabel {
  375. return false, errors.New("not managed by external-secrets")
  376. }
  377. }
  378. return true, nil
  379. }
  380. func (a *Azure) setKeyVaultSecret(ctx context.Context, secretName string, value []byte, expires *date.UnixTime) error {
  381. secret, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  382. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  383. ok, err := canCreate(secret.Tags, err)
  384. if err != nil {
  385. return fmt.Errorf("cannot get secret %v: %w", secretName, err)
  386. }
  387. if !ok {
  388. return nil
  389. }
  390. val := string(value)
  391. if secret.Value != nil && val == *secret.Value {
  392. if secret.Attributes != nil {
  393. if (secret.Attributes.Expires == nil && expires == nil) ||
  394. (secret.Attributes.Expires != nil && expires != nil && *secret.Attributes.Expires == *expires) {
  395. return nil
  396. }
  397. }
  398. }
  399. secretParams := keyvault.SecretSetParameters{
  400. Value: &val,
  401. Tags: map[string]*string{
  402. "managed-by": pointer.To(managerLabel),
  403. },
  404. SecretAttributes: &keyvault.SecretAttributes{
  405. Enabled: pointer.To(true),
  406. },
  407. }
  408. if expires != nil {
  409. secretParams.SecretAttributes.Expires = expires
  410. }
  411. _, err = a.baseClient.SetSecret(ctx, *a.provider.VaultURL, secretName, secretParams)
  412. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  413. if err != nil {
  414. return fmt.Errorf("could not set secret %v: %w", secretName, err)
  415. }
  416. return nil
  417. }
  418. func (a *Azure) setKeyVaultCertificate(ctx context.Context, secretName string, value []byte) error {
  419. val := b64.StdEncoding.EncodeToString(value)
  420. localCert, err := getCertificateFromValue(value)
  421. if err != nil {
  422. return fmt.Errorf("value from secret is not a valid certificate: %w", err)
  423. }
  424. cert, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, "")
  425. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  426. ok, err := canCreate(cert.Tags, err)
  427. if err != nil {
  428. return fmt.Errorf("cannot get certificate %v: %w", secretName, err)
  429. }
  430. if !ok {
  431. return nil
  432. }
  433. b512 := sha3.Sum512(localCert.Raw)
  434. if cert.Cer != nil && b512 == sha3.Sum512(*cert.Cer) {
  435. return nil
  436. }
  437. params := keyvault.CertificateImportParameters{
  438. Base64EncodedCertificate: &val,
  439. Tags: map[string]*string{
  440. "managed-by": pointer.To(managerLabel),
  441. },
  442. }
  443. _, err = a.baseClient.ImportCertificate(ctx, *a.provider.VaultURL, secretName, params)
  444. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVImportCertificate, err)
  445. if err != nil {
  446. return fmt.Errorf("could not import certificate %v: %w", secretName, err)
  447. }
  448. return nil
  449. }
  450. func equalKeys(newKey, oldKey keyvault.JSONWebKey) bool {
  451. // checks for everything except KeyID and KeyOps
  452. rsaCheck := newKey.E != nil && oldKey.E != nil && *newKey.E == *oldKey.E &&
  453. newKey.N != nil && oldKey.N != nil && *newKey.N == *oldKey.N
  454. symmetricCheck := newKey.Crv == oldKey.Crv &&
  455. newKey.T != nil && oldKey.T != nil && *newKey.T == *oldKey.T &&
  456. newKey.X != nil && oldKey.X != nil && *newKey.X == *oldKey.X &&
  457. newKey.Y != nil && oldKey.Y != nil && *newKey.Y == *oldKey.Y
  458. return newKey.Kty == oldKey.Kty && (rsaCheck || symmetricCheck)
  459. }
  460. func (a *Azure) setKeyVaultKey(ctx context.Context, secretName string, value []byte) error {
  461. key, err := getKeyFromValue(value)
  462. if err != nil {
  463. return fmt.Errorf("could not load private key %v: %w", secretName, err)
  464. }
  465. jwKey, err := jwk.FromRaw(key)
  466. if err != nil {
  467. return fmt.Errorf("failed to generate a JWK from secret %v content: %w", secretName, err)
  468. }
  469. buf, err := json.Marshal(jwKey)
  470. if err != nil {
  471. return fmt.Errorf("error parsing key: %w", err)
  472. }
  473. azkey := keyvault.JSONWebKey{}
  474. err = json.Unmarshal(buf, &azkey)
  475. if err != nil {
  476. return fmt.Errorf("error unmarshalling key: %w", err)
  477. }
  478. keyFromVault, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, "")
  479. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  480. ok, err := canCreate(keyFromVault.Tags, err)
  481. if err != nil {
  482. return fmt.Errorf("cannot get key %v: %w", secretName, err)
  483. }
  484. if !ok {
  485. return nil
  486. }
  487. if keyFromVault.Key != nil && equalKeys(azkey, *keyFromVault.Key) {
  488. return nil
  489. }
  490. params := keyvault.KeyImportParameters{
  491. Key: &azkey,
  492. KeyAttributes: &keyvault.KeyAttributes{},
  493. Tags: map[string]*string{
  494. "managed-by": pointer.To(managerLabel),
  495. },
  496. }
  497. _, err = a.baseClient.ImportKey(ctx, *a.provider.VaultURL, secretName, params)
  498. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVImportKey, err)
  499. if err != nil {
  500. return fmt.Errorf("could not import key %v: %w", secretName, err)
  501. }
  502. return nil
  503. }
  504. // PushSecret stores secrets into a Key vault instance.
  505. func (a *Azure) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  506. var (
  507. value []byte
  508. err error
  509. expires *date.UnixTime
  510. )
  511. if data.GetSecretKey() == "" {
  512. // Must convert secret values to string, otherwise data will be sent as base64 to Vault
  513. secretStringVal := make(map[string]string)
  514. for k, v := range secret.Data {
  515. secretStringVal[k] = string(v)
  516. }
  517. value, err = utils.JSONMarshal(secretStringVal)
  518. if err != nil {
  519. return fmt.Errorf("failed to serialize secret content as JSON: %w", err)
  520. }
  521. } else {
  522. value = secret.Data[data.GetSecretKey()]
  523. }
  524. metadata, err := metadata.ParseMetadataParameters[PushSecretMetadataSpec](data.GetMetadata())
  525. if err != nil {
  526. return fmt.Errorf("failed to parse push secret metadata: %w", err)
  527. }
  528. if metadata != nil && metadata.Spec.ExpirationDate != "" {
  529. t, err := time.Parse(time.RFC3339, metadata.Spec.ExpirationDate)
  530. if err != nil {
  531. return fmt.Errorf("error parsing expiration date in metadata: %w. Expected format: YYYY-MM-DDTHH:MM:SSZ (RFC3339). Example: 2024-12-31T20:00:00Z", err)
  532. }
  533. unixTime := date.UnixTime(t)
  534. expires = &unixTime
  535. }
  536. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: data.GetRemoteKey()})
  537. switch objectType {
  538. case defaultObjType:
  539. return a.setKeyVaultSecret(ctx, secretName, value, expires)
  540. case objectTypeCert:
  541. return a.setKeyVaultCertificate(ctx, secretName, value)
  542. case objectTypeKey:
  543. return a.setKeyVaultKey(ctx, secretName, value)
  544. default:
  545. return fmt.Errorf("secret type %v not supported", objectType)
  546. }
  547. }
  548. // Implements store.Client.GetAllSecrets Interface.
  549. // Retrieves a map[string][]byte with the secret names as key and the secret itself as the calue.
  550. func (a *Azure) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  551. basicClient := a.baseClient
  552. secretsMap := make(map[string][]byte)
  553. checkTags := len(ref.Tags) > 0
  554. checkName := ref.Name != nil && ref.Name.RegExp != ""
  555. secretListIter, err := basicClient.GetSecretsComplete(ctx, *a.provider.VaultURL, nil)
  556. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecrets, err)
  557. err = parseError(err)
  558. if err != nil {
  559. return nil, err
  560. }
  561. for secretListIter.NotDone() {
  562. secret := secretListIter.Value()
  563. ok, secretName := isValidSecret(checkTags, checkName, ref, secret)
  564. if !ok {
  565. err = secretListIter.Next()
  566. if err != nil {
  567. return nil, err
  568. }
  569. continue
  570. }
  571. secretResp, err := basicClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  572. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  573. err = parseError(err)
  574. if err != nil {
  575. return nil, err
  576. }
  577. secretValue := *secretResp.Value
  578. secretsMap[secretName] = []byte(secretValue)
  579. err = secretListIter.Next()
  580. if err != nil {
  581. return nil, err
  582. }
  583. }
  584. return secretsMap, nil
  585. }
  586. // Retrieves a tag value if specified and all tags in JSON format if not.
  587. func getSecretTag(tags map[string]*string, property string) ([]byte, error) {
  588. if property == "" {
  589. secretTagsData := make(map[string]string)
  590. for k, v := range tags {
  591. secretTagsData[k] = *v
  592. }
  593. return json.Marshal(secretTagsData)
  594. }
  595. if val, exist := tags[property]; exist {
  596. return []byte(*val), nil
  597. }
  598. idx := strings.Index(property, ".")
  599. if idx < 0 {
  600. return nil, fmt.Errorf(errTagNotExist, property)
  601. }
  602. if idx > 0 {
  603. tagName := property[0:idx]
  604. if val, exist := tags[tagName]; exist {
  605. key := strings.Replace(property, tagName+".", "", 1)
  606. return getProperty(*val, key, property)
  607. }
  608. }
  609. return nil, fmt.Errorf(errTagNotExist, property)
  610. }
  611. // Retrieves a property value if specified and the secret value if not.
  612. func getProperty(secret, property, key string) ([]byte, error) {
  613. if property == "" {
  614. return []byte(secret), nil
  615. }
  616. res := gjson.Get(secret, property)
  617. if !res.Exists() {
  618. idx := strings.Index(property, ".")
  619. if idx < 0 {
  620. return nil, fmt.Errorf(errPropNotExist, property, key)
  621. }
  622. escaped := strings.ReplaceAll(property, ".", "\\.")
  623. jValue := gjson.Get(secret, escaped)
  624. if jValue.Exists() {
  625. return []byte(jValue.String()), nil
  626. }
  627. return nil, fmt.Errorf(errPropNotExist, property, key)
  628. }
  629. return []byte(res.String()), nil
  630. }
  631. func parseError(err error) error {
  632. aerr := autorest.DetailedError{}
  633. if errors.As(err, &aerr) && aerr.StatusCode == 404 {
  634. return esv1beta1.NoSecretError{}
  635. }
  636. return err
  637. }
  638. // Implements store.Client.GetSecret Interface.
  639. // Retrieves a secret/Key/Certificate/Tag with the secret name defined in ref.Name
  640. // The Object Type is defined as a prefix in the ref.Name , if no prefix is defined , we assume a secret is required.
  641. func (a *Azure) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  642. objectType, secretName := getObjType(ref)
  643. switch objectType {
  644. case defaultObjType:
  645. // returns a SecretBundle with the secret value
  646. // https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#SecretBundle
  647. secretResp, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, ref.Version)
  648. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  649. err = parseError(err)
  650. if err != nil {
  651. return nil, err
  652. }
  653. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  654. return getSecretTag(secretResp.Tags, ref.Property)
  655. }
  656. return getProperty(*secretResp.Value, ref.Property, ref.Key)
  657. case objectTypeCert:
  658. // returns a CertBundle. We return CER contents of x509 certificate
  659. // see: https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#CertificateBundle
  660. certResp, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, ref.Version)
  661. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  662. err = parseError(err)
  663. if err != nil {
  664. return nil, err
  665. }
  666. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  667. return getSecretTag(certResp.Tags, ref.Property)
  668. }
  669. return *certResp.Cer, nil
  670. case objectTypeKey:
  671. // returns a KeyBundle that contains a jwk
  672. // azure kv returns only public keys
  673. // see: https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#KeyBundle
  674. keyResp, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, ref.Version)
  675. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  676. err = parseError(err)
  677. if err != nil {
  678. return nil, err
  679. }
  680. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  681. return getSecretTag(keyResp.Tags, ref.Property)
  682. }
  683. return json.Marshal(keyResp.Key)
  684. }
  685. return nil, fmt.Errorf(errUnknownObjectType, secretName)
  686. }
  687. // returns a SecretBundle with the tags values.
  688. func (a *Azure) getSecretTags(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string]*string, error) {
  689. _, secretName := getObjType(ref)
  690. secretResp, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, ref.Version)
  691. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  692. err = parseError(err)
  693. if err != nil {
  694. return nil, err
  695. }
  696. secretTagsData := make(map[string]*string)
  697. for tagname, tagval := range secretResp.Tags {
  698. name := secretName + "_" + tagname
  699. kv := make(map[string]string)
  700. err = json.Unmarshal([]byte(*tagval), &kv)
  701. // if the tagvalue is not in JSON format then we added to secretTagsData we added as it is
  702. if err != nil {
  703. secretTagsData[name] = tagval
  704. } else {
  705. for k, v := range kv {
  706. value := v
  707. secretTagsData[name+"_"+k] = &value
  708. }
  709. }
  710. }
  711. return secretTagsData, nil
  712. }
  713. // Implements store.Client.GetSecretMap Interface.
  714. // New version of GetSecretMap.
  715. func (a *Azure) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  716. objectType, secretName := getObjType(ref)
  717. switch objectType {
  718. case defaultObjType:
  719. data, err := a.GetSecret(ctx, ref)
  720. if err != nil {
  721. return nil, err
  722. }
  723. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  724. tags, _ := a.getSecretTags(ctx, ref)
  725. return getSecretMapProperties(tags, ref.Key, ref.Property), nil
  726. }
  727. return getSecretMapMap(data)
  728. case objectTypeCert:
  729. return nil, errors.New(errDataFromCert)
  730. case objectTypeKey:
  731. return nil, errors.New(errDataFromKey)
  732. }
  733. return nil, fmt.Errorf(errUnknownObjectType, secretName)
  734. }
  735. func getSecretMapMap(data []byte) (map[string][]byte, error) {
  736. kv := make(map[string]json.RawMessage)
  737. err := json.Unmarshal(data, &kv)
  738. if err != nil {
  739. return nil, fmt.Errorf(errUnmarshalJSONData, err)
  740. }
  741. secretData := make(map[string][]byte)
  742. for k, v := range kv {
  743. var strVal string
  744. err = json.Unmarshal(v, &strVal)
  745. if err == nil {
  746. secretData[k] = []byte(strVal)
  747. } else {
  748. secretData[k] = v
  749. }
  750. }
  751. return secretData, nil
  752. }
  753. func getSecretMapProperties(tags map[string]*string, key, property string) map[string][]byte {
  754. tagByteArray := make(map[string][]byte)
  755. if property != "" {
  756. keyPropertyName := key + "_" + property
  757. singleTag, _ := getSecretTag(tags, keyPropertyName)
  758. tagByteArray[keyPropertyName] = singleTag
  759. return tagByteArray
  760. }
  761. for k, v := range tags {
  762. tagByteArray[k] = []byte(*v)
  763. }
  764. return tagByteArray
  765. }
  766. func (a *Azure) authorizerForWorkloadIdentity(ctx context.Context, tokenProvider tokenProviderFunc) (autorest.Authorizer, error) {
  767. aadEndpoint := AadEndpointForType(a.provider.EnvironmentType)
  768. kvResource := kvResourceForProviderConfig(a.provider.EnvironmentType)
  769. // If no serviceAccountRef was provided
  770. // we expect certain env vars to be present.
  771. // They are set by the azure workload identity webhook
  772. // by adding the label `azure.workload.identity/use: "true"` to the external-secrets pod
  773. if a.provider.ServiceAccountRef == nil {
  774. clientID := os.Getenv("AZURE_CLIENT_ID")
  775. tenantID := os.Getenv("AZURE_TENANT_ID")
  776. tokenFilePath := os.Getenv("AZURE_FEDERATED_TOKEN_FILE")
  777. if clientID == "" || tenantID == "" || tokenFilePath == "" {
  778. return nil, errors.New(errMissingWorkloadEnvVars)
  779. }
  780. token, err := os.ReadFile(tokenFilePath)
  781. if err != nil {
  782. return nil, fmt.Errorf(errReadTokenFile, tokenFilePath, err)
  783. }
  784. tp, err := tokenProvider(ctx, string(token), clientID, tenantID, aadEndpoint, kvResource)
  785. if err != nil {
  786. return nil, err
  787. }
  788. return autorest.NewBearerAuthorizer(tp), nil
  789. }
  790. ns := a.namespace
  791. if a.store.GetKind() == esv1beta1.ClusterSecretStoreKind && a.provider.ServiceAccountRef.Namespace != nil {
  792. ns = *a.provider.ServiceAccountRef.Namespace
  793. }
  794. var sa corev1.ServiceAccount
  795. err := a.crClient.Get(ctx, types.NamespacedName{
  796. Name: a.provider.ServiceAccountRef.Name,
  797. Namespace: ns,
  798. }, &sa)
  799. if err != nil {
  800. return nil, err
  801. }
  802. // Extract clientID
  803. var clientID string
  804. // First check if AuthSecretRef is set and clientID can be fetched from there
  805. if a.provider.AuthSecretRef != nil {
  806. if a.provider.AuthSecretRef.ClientID == nil {
  807. return nil, errors.New(errMissingClientIDSecret)
  808. }
  809. clientID, err = resolvers.SecretKeyRef(
  810. ctx,
  811. a.crClient,
  812. a.store.GetKind(),
  813. a.namespace, a.provider.AuthSecretRef.ClientID)
  814. if err != nil {
  815. return nil, err
  816. }
  817. }
  818. // If AuthSecretRef is not set, use default (Service Account) implementation
  819. // Try to get clientID from Annotations
  820. if len(sa.ObjectMeta.Annotations) > 0 {
  821. if val, found := sa.ObjectMeta.Annotations[AnnotationClientID]; found {
  822. // If clientID is defined in both Annotations and AuthSecretRef, return an error
  823. if clientID != "" {
  824. return nil, errors.New(errMultipleClientID)
  825. }
  826. clientID = val
  827. }
  828. }
  829. // Return an error if clientID is still empty
  830. if clientID == "" {
  831. return nil, fmt.Errorf(errMissingClient, AnnotationClientID)
  832. }
  833. // Extract tenantID
  834. var tenantID string
  835. // First check if AuthSecretRef is set and tenantID can be fetched from there
  836. if a.provider.AuthSecretRef != nil {
  837. // We may want to set tenantID explicitly in the `spec.provider.azurekv` section of the SecretStore object
  838. // So that is okay if it is not there
  839. if a.provider.AuthSecretRef.TenantID != nil {
  840. tenantID, err = resolvers.SecretKeyRef(
  841. ctx,
  842. a.crClient,
  843. a.store.GetKind(),
  844. a.namespace, a.provider.AuthSecretRef.TenantID)
  845. if err != nil {
  846. return nil, err
  847. }
  848. }
  849. }
  850. // Check if spec.provider.azurekv.tenantID is set
  851. if tenantID == "" && a.provider.TenantID != nil {
  852. tenantID = *a.provider.TenantID
  853. }
  854. // Try to get tenantID from Annotations first. Default implementation.
  855. if len(sa.ObjectMeta.Annotations) > 0 {
  856. if val, found := sa.ObjectMeta.Annotations[AnnotationTenantID]; found {
  857. // If tenantID is defined in both Annotations and AuthSecretRef, return an error
  858. if tenantID != "" {
  859. return nil, errors.New(errMultipleTenantID)
  860. }
  861. tenantID = val
  862. }
  863. }
  864. // Fallback: use the AZURE_TENANT_ID env var which is set by the azure workload identity webhook
  865. // https://azure.github.io/azure-workload-identity/docs/topics/service-account-labels-and-annotations.html#service-account
  866. if tenantID == "" {
  867. tenantID = os.Getenv("AZURE_TENANT_ID")
  868. }
  869. // Return an error if tenantID is still empty
  870. if tenantID == "" {
  871. return nil, errors.New(errMissingTenant)
  872. }
  873. audiences := []string{AzureDefaultAudience}
  874. if len(a.provider.ServiceAccountRef.Audiences) > 0 {
  875. audiences = append(audiences, a.provider.ServiceAccountRef.Audiences...)
  876. }
  877. token, err := FetchSAToken(ctx, ns, a.provider.ServiceAccountRef.Name, audiences, a.kubeClient)
  878. if err != nil {
  879. return nil, err
  880. }
  881. tp, err := tokenProvider(ctx, token, clientID, tenantID, aadEndpoint, kvResource)
  882. if err != nil {
  883. return nil, err
  884. }
  885. return autorest.NewBearerAuthorizer(tp), nil
  886. }
  887. func FetchSAToken(ctx context.Context, ns, name string, audiences []string, kubeClient kcorev1.CoreV1Interface) (string, error) {
  888. token, err := kubeClient.ServiceAccounts(ns).CreateToken(ctx, name, &authv1.TokenRequest{
  889. Spec: authv1.TokenRequestSpec{
  890. Audiences: audiences,
  891. },
  892. }, metav1.CreateOptions{})
  893. if err != nil {
  894. return "", err
  895. }
  896. return token.Status.Token, nil
  897. }
  898. // tokenProvider satisfies the adal.OAuthTokenProvider interface.
  899. type tokenProvider struct {
  900. accessToken string
  901. }
  902. type tokenProviderFunc func(ctx context.Context, token, clientID, tenantID, aadEndpoint, kvResource string) (adal.OAuthTokenProvider, error)
  903. func NewTokenProvider(ctx context.Context, token, clientID, tenantID, aadEndpoint, kvResource string) (adal.OAuthTokenProvider, error) {
  904. // exchange token with Azure AccessToken
  905. cred := confidential.NewCredFromAssertionCallback(func(ctx context.Context, aro confidential.AssertionRequestOptions) (string, error) {
  906. return token, nil
  907. })
  908. cClient, err := confidential.New(fmt.Sprintf("%s%s", aadEndpoint, tenantID), clientID, cred)
  909. if err != nil {
  910. return nil, err
  911. }
  912. scope := kvResource
  913. // .default needs to be added to the scope
  914. if !strings.Contains(kvResource, ".default") {
  915. scope = fmt.Sprintf("%s/.default", kvResource)
  916. }
  917. authRes, err := cClient.AcquireTokenByCredential(ctx, []string{
  918. scope,
  919. })
  920. if err != nil {
  921. return nil, err
  922. }
  923. return &tokenProvider{
  924. accessToken: authRes.AccessToken,
  925. }, nil
  926. }
  927. func (t *tokenProvider) OAuthToken() string {
  928. return t.accessToken
  929. }
  930. func (a *Azure) authorizerForManagedIdentity() (autorest.Authorizer, error) {
  931. msiConfig := kvauth.NewMSIConfig()
  932. msiConfig.Resource = kvResourceForProviderConfig(a.provider.EnvironmentType)
  933. if a.provider.IdentityID != nil {
  934. msiConfig.ClientID = *a.provider.IdentityID
  935. }
  936. return msiConfig.Authorizer()
  937. }
  938. func (a *Azure) authorizerForServicePrincipal(ctx context.Context) (autorest.Authorizer, error) {
  939. if a.provider.TenantID == nil {
  940. return nil, errors.New(errMissingTenant)
  941. }
  942. if a.provider.AuthSecretRef == nil {
  943. return nil, errors.New(errMissingSecretRef)
  944. }
  945. if a.provider.AuthSecretRef.ClientID == nil || (a.provider.AuthSecretRef.ClientSecret == nil && a.provider.AuthSecretRef.ClientCertificate == nil) {
  946. return nil, errors.New(errMissingClientIDSecret)
  947. }
  948. if a.provider.AuthSecretRef.ClientSecret != nil && a.provider.AuthSecretRef.ClientCertificate != nil {
  949. return nil, errors.New(errInvalidClientCredentials)
  950. }
  951. return a.getAuthorizerFromCredentials(ctx)
  952. }
  953. func (a *Azure) getAuthorizerFromCredentials(ctx context.Context) (autorest.Authorizer, error) {
  954. clientID, err := resolvers.SecretKeyRef(
  955. ctx,
  956. a.crClient,
  957. a.store.GetKind(),
  958. a.namespace, a.provider.AuthSecretRef.ClientID,
  959. )
  960. if err != nil {
  961. return nil, err
  962. }
  963. if a.provider.AuthSecretRef.ClientSecret != nil {
  964. clientSecret, err := resolvers.SecretKeyRef(
  965. ctx,
  966. a.crClient,
  967. a.store.GetKind(),
  968. a.namespace, a.provider.AuthSecretRef.ClientSecret,
  969. )
  970. if err != nil {
  971. return nil, err
  972. }
  973. return getAuthorizerForClientSecret(
  974. clientID,
  975. clientSecret,
  976. *a.provider.TenantID,
  977. a.provider.EnvironmentType,
  978. )
  979. } else {
  980. clientCertificate, err := resolvers.SecretKeyRef(
  981. ctx,
  982. a.crClient,
  983. a.store.GetKind(),
  984. a.namespace, a.provider.AuthSecretRef.ClientCertificate,
  985. )
  986. if err != nil {
  987. return nil, err
  988. }
  989. return getAuthorizerForClientCertificate(
  990. clientID,
  991. []byte(clientCertificate),
  992. *a.provider.TenantID,
  993. a.provider.EnvironmentType,
  994. )
  995. }
  996. }
  997. func getAuthorizerForClientSecret(clientID, clientSecret, tenantID string, environmentType esv1beta1.AzureEnvironmentType) (autorest.Authorizer, error) {
  998. clientCredentialsConfig := kvauth.NewClientCredentialsConfig(clientID, clientSecret, tenantID)
  999. clientCredentialsConfig.Resource = kvResourceForProviderConfig(environmentType)
  1000. clientCredentialsConfig.AADEndpoint = AadEndpointForType(environmentType)
  1001. return clientCredentialsConfig.Authorizer()
  1002. }
  1003. func getAuthorizerForClientCertificate(clientID string, certificateBytes []byte, tenantID string, environmentType esv1beta1.AzureEnvironmentType) (autorest.Authorizer, error) {
  1004. clientCertificateConfig := NewClientInMemoryCertificateConfig(clientID, certificateBytes, tenantID)
  1005. clientCertificateConfig.Resource = kvResourceForProviderConfig(environmentType)
  1006. clientCertificateConfig.AADEndpoint = AadEndpointForType(environmentType)
  1007. return clientCertificateConfig.Authorizer()
  1008. }
  1009. func (a *Azure) Close(_ context.Context) error {
  1010. return nil
  1011. }
  1012. func (a *Azure) Validate() (esv1beta1.ValidationResult, error) {
  1013. if a.store.GetKind() == esv1beta1.ClusterSecretStoreKind && isReferentSpec(a.provider) {
  1014. return esv1beta1.ValidationResultUnknown, nil
  1015. }
  1016. return esv1beta1.ValidationResultReady, nil
  1017. }
  1018. func isReferentSpec(prov *esv1beta1.AzureKVProvider) bool {
  1019. if prov.AuthSecretRef != nil &&
  1020. ((prov.AuthSecretRef.ClientID != nil &&
  1021. prov.AuthSecretRef.ClientID.Namespace == nil) ||
  1022. (prov.AuthSecretRef.ClientSecret != nil &&
  1023. prov.AuthSecretRef.ClientSecret.Namespace == nil)) {
  1024. return true
  1025. }
  1026. if prov.ServiceAccountRef != nil &&
  1027. prov.ServiceAccountRef.Namespace == nil {
  1028. return true
  1029. }
  1030. return false
  1031. }
  1032. func AadEndpointForType(t esv1beta1.AzureEnvironmentType) string {
  1033. switch t {
  1034. case esv1beta1.AzureEnvironmentPublicCloud:
  1035. return azure.PublicCloud.ActiveDirectoryEndpoint
  1036. case esv1beta1.AzureEnvironmentChinaCloud:
  1037. return azure.ChinaCloud.ActiveDirectoryEndpoint
  1038. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  1039. return azure.USGovernmentCloud.ActiveDirectoryEndpoint
  1040. case esv1beta1.AzureEnvironmentGermanCloud:
  1041. return azure.GermanCloud.ActiveDirectoryEndpoint
  1042. default:
  1043. return azure.PublicCloud.ActiveDirectoryEndpoint
  1044. }
  1045. }
  1046. func ServiceManagementEndpointForType(t esv1beta1.AzureEnvironmentType) string {
  1047. switch t {
  1048. case esv1beta1.AzureEnvironmentPublicCloud:
  1049. return azure.PublicCloud.ServiceManagementEndpoint
  1050. case esv1beta1.AzureEnvironmentChinaCloud:
  1051. return azure.ChinaCloud.ServiceManagementEndpoint
  1052. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  1053. return azure.USGovernmentCloud.ServiceManagementEndpoint
  1054. case esv1beta1.AzureEnvironmentGermanCloud:
  1055. return azure.GermanCloud.ServiceManagementEndpoint
  1056. default:
  1057. return azure.PublicCloud.ServiceManagementEndpoint
  1058. }
  1059. }
  1060. func kvResourceForProviderConfig(t esv1beta1.AzureEnvironmentType) string {
  1061. var res string
  1062. switch t {
  1063. case esv1beta1.AzureEnvironmentPublicCloud:
  1064. res = azure.PublicCloud.KeyVaultEndpoint
  1065. case esv1beta1.AzureEnvironmentChinaCloud:
  1066. res = azure.ChinaCloud.KeyVaultEndpoint
  1067. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  1068. res = azure.USGovernmentCloud.KeyVaultEndpoint
  1069. case esv1beta1.AzureEnvironmentGermanCloud:
  1070. res = azure.GermanCloud.KeyVaultEndpoint
  1071. default:
  1072. res = azure.PublicCloud.KeyVaultEndpoint
  1073. }
  1074. return strings.TrimSuffix(res, "/")
  1075. }
  1076. func getObjType(ref esv1beta1.ExternalSecretDataRemoteRef) (string, string) {
  1077. objectType := defaultObjType
  1078. secretName := ref.Key
  1079. nameSplitted := strings.Split(secretName, "/")
  1080. if len(nameSplitted) > 1 {
  1081. objectType = nameSplitted[0]
  1082. secretName = nameSplitted[1]
  1083. // TODO: later tokens can be used to read the secret tags
  1084. }
  1085. return objectType, secretName
  1086. }
  1087. func isValidSecret(checkTags, checkName bool, ref esv1beta1.ExternalSecretFind, secret keyvault.SecretItem) (bool, string) {
  1088. if secret.ID == nil || !*secret.Attributes.Enabled {
  1089. return false, ""
  1090. }
  1091. if checkTags && !okByTags(ref, secret) {
  1092. return false, ""
  1093. }
  1094. secretName := path.Base(*secret.ID)
  1095. if checkName && !okByName(ref, secretName) {
  1096. return false, ""
  1097. }
  1098. return true, secretName
  1099. }
  1100. func okByName(ref esv1beta1.ExternalSecretFind, secretName string) bool {
  1101. matches, _ := regexp.MatchString(ref.Name.RegExp, secretName)
  1102. return matches
  1103. }
  1104. func okByTags(ref esv1beta1.ExternalSecretFind, secret keyvault.SecretItem) bool {
  1105. tagsFound := true
  1106. for k, v := range ref.Tags {
  1107. if val, ok := secret.Tags[k]; !ok || *val != v {
  1108. tagsFound = false
  1109. break
  1110. }
  1111. }
  1112. return tagsFound
  1113. }