akeyless.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/tls"
  17. "crypto/x509"
  18. "encoding/json"
  19. "errors"
  20. "fmt"
  21. "net/http"
  22. "net/url"
  23. "slices"
  24. "strconv"
  25. "strings"
  26. "time"
  27. "github.com/akeylesslabs/akeyless-go/v3"
  28. "github.com/tidwall/gjson"
  29. corev1 "k8s.io/api/core/v1"
  30. "k8s.io/client-go/kubernetes"
  31. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  32. "sigs.k8s.io/controller-runtime/pkg/client"
  33. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  34. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  35. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  36. "github.com/external-secrets/external-secrets/pkg/find"
  37. "github.com/external-secrets/external-secrets/pkg/utils"
  38. )
  39. type AkeylessCtx string
  40. const (
  41. defaultAPIUrl = "https://api.akeyless.io"
  42. extSecretManagedTag = "k8s-external-secrets"
  43. aKeylessToken AkeylessCtx = "AKEYLESS_TOKEN"
  44. )
  45. // https://github.com/external-secrets/external-secrets/issues/644
  46. var _ esv1.SecretsClient = &Akeyless{}
  47. var _ esv1.Provider = &Provider{}
  48. // Provider satisfies the provider interface.
  49. type Provider struct{}
  50. // akeylessBase satisfies the provider.SecretsClient interface.
  51. type akeylessBase struct {
  52. kube client.Client
  53. store esv1.GenericStore
  54. storeKind string
  55. corev1 typedcorev1.CoreV1Interface
  56. namespace string
  57. akeylessGwAPIURL string
  58. RestAPI *akeyless.V2ApiService
  59. }
  60. type Akeyless struct {
  61. Client akeylessVaultInterface
  62. url string
  63. }
  64. type Item struct {
  65. ItemName string `json:"item_name"`
  66. ItemType string `json:"item_type"`
  67. LastVersion int32 `json:"last_version"`
  68. }
  69. type akeylessVaultInterface interface {
  70. GetSecretByType(ctx context.Context, secretName string, version int32) (string, error)
  71. TokenFromSecretRef(ctx context.Context) (string, error)
  72. ListSecrets(ctx context.Context, path, tag string) ([]string, error)
  73. DescribeItem(ctx context.Context, itemName string) (*akeyless.Item, error)
  74. CreateSecret(ctx context.Context, remoteKey, data string) error
  75. UpdateSecret(ctx context.Context, remoteKey, data string) error
  76. DeleteSecret(ctx context.Context, remoteKey string) error
  77. }
  78. func init() {
  79. esv1.Register(&Provider{}, &esv1.SecretStoreProvider{
  80. Akeyless: &esv1.AkeylessProvider{},
  81. }, esv1.MaintenanceStatusMaintained)
  82. }
  83. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  84. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  85. return esv1.SecretStoreReadOnly
  86. }
  87. // NewClient constructs a new secrets client based on the provided store.
  88. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube client.Client, namespace string) (esv1.SecretsClient, error) {
  89. // controller-runtime/client does not support TokenRequest or other subresource APIs
  90. // so we need to construct our own client and use it to fetch tokens
  91. // (for Kubernetes service account token auth)
  92. restCfg, err := ctrlcfg.GetConfig()
  93. if err != nil {
  94. return nil, err
  95. }
  96. clientset, err := kubernetes.NewForConfig(restCfg)
  97. if err != nil {
  98. return nil, err
  99. }
  100. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  101. }
  102. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  103. storeSpec := store.GetSpec()
  104. akeylessSpec := storeSpec.Provider.Akeyless
  105. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  106. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  107. url, err := url.Parse(*akeylessGWApiURL)
  108. if err != nil {
  109. return nil, errors.New(errInvalidAkeylessURL)
  110. }
  111. if url.Host == "" {
  112. return nil, errors.New(errInvalidAkeylessURL)
  113. }
  114. }
  115. if akeylessSpec.Auth.KubernetesAuth != nil {
  116. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  117. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  118. return nil, fmt.Errorf(errInvalidKubeSA, err)
  119. }
  120. }
  121. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  122. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  123. if err != nil {
  124. return nil, err
  125. }
  126. }
  127. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  128. return nil, errors.New("missing kubernetes auth-method access-id")
  129. }
  130. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  131. return nil, errors.New("missing kubernetes config name")
  132. }
  133. return nil, nil
  134. }
  135. accessID := akeylessSpec.Auth.SecretRef.AccessID
  136. err := utils.ValidateSecretSelector(store, accessID)
  137. if err != nil {
  138. return nil, err
  139. }
  140. if accessID.Name == "" {
  141. return nil, errors.New(errInvalidAkeylessAccessIDName)
  142. }
  143. if accessID.Key == "" {
  144. return nil, errors.New(errInvalidAkeylessAccessIDKey)
  145. }
  146. accessType := akeylessSpec.Auth.SecretRef.AccessType
  147. err = utils.ValidateSecretSelector(store, accessType)
  148. if err != nil {
  149. return nil, err
  150. }
  151. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  152. err = utils.ValidateSecretSelector(store, accessTypeParam)
  153. if err != nil {
  154. return nil, err
  155. }
  156. return nil, nil
  157. }
  158. func newClient(ctx context.Context, store esv1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  159. akl := &akeylessBase{
  160. kube: kube,
  161. store: store,
  162. namespace: namespace,
  163. corev1: corev1,
  164. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  165. }
  166. spec, err := GetAKeylessProvider(store)
  167. if err != nil {
  168. return nil, err
  169. }
  170. akeylessGwAPIURL := defaultAPIUrl
  171. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  172. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  173. }
  174. if spec.Auth == nil {
  175. return nil, errors.New("missing Auth in store config")
  176. }
  177. client, err := akl.getAkeylessHTTPClient(ctx, spec)
  178. if err != nil {
  179. return nil, err
  180. }
  181. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  182. HTTPClient: client,
  183. Servers: []akeyless.ServerConfiguration{
  184. {
  185. URL: akeylessGwAPIURL,
  186. },
  187. },
  188. }).V2Api
  189. akl.akeylessGwAPIURL = akeylessGwAPIURL
  190. akl.RestAPI = RestAPIClient
  191. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  192. }
  193. func (a *Akeyless) contextWithToken(ctx context.Context) (context.Context, error) {
  194. if v := ctx.Value(aKeylessToken); v != nil {
  195. return ctx, nil
  196. }
  197. token, err := a.Client.TokenFromSecretRef(ctx)
  198. if err != nil {
  199. return nil, err
  200. }
  201. return context.WithValue(ctx, aKeylessToken, token), nil
  202. }
  203. func (a *Akeyless) Close(_ context.Context) error {
  204. return nil
  205. }
  206. func (a *Akeyless) Validate() (esv1.ValidationResult, error) {
  207. timeout := 15 * time.Second
  208. url := a.url
  209. if err := utils.NetworkValidate(url, timeout); err != nil {
  210. return esv1.ValidationResultError, err
  211. }
  212. return esv1.ValidationResultReady, nil
  213. }
  214. // Implements store.Client.GetSecret Interface.
  215. // Retrieves a secret with the secret name defined in ref.Name.
  216. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  217. if utils.IsNil(a.Client) {
  218. return nil, errors.New(errUninitalizedAkeylessProvider)
  219. }
  220. ctx, err := a.contextWithToken(ctx)
  221. if err != nil {
  222. return nil, err
  223. }
  224. version := int32(0)
  225. if ref.Version != "" {
  226. i, err := strconv.ParseInt(ref.Version, 10, 32)
  227. if err == nil {
  228. version = int32(i)
  229. }
  230. }
  231. value, err := a.Client.GetSecretByType(ctx, ref.Key, version)
  232. if err != nil {
  233. return nil, err
  234. }
  235. if ref.Property == "" {
  236. if value != "" {
  237. return []byte(value), nil
  238. }
  239. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  240. }
  241. // We need to search if a given key with a . exists before using gjson operations.
  242. idx := strings.Index(ref.Property, ".")
  243. if idx > -1 {
  244. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  245. val := gjson.Get(value, refProperty)
  246. if val.Exists() {
  247. return []byte(val.String()), nil
  248. }
  249. }
  250. val := gjson.Get(value, ref.Property)
  251. if !val.Exists() {
  252. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  253. }
  254. return []byte(val.String()), nil
  255. }
  256. // GetAllSecrets Implements store.Client.GetAllSecrets Interface.
  257. // Retrieves all secrets with defined in ref.Name or tags.
  258. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  259. if utils.IsNil(a.Client) {
  260. return nil, errors.New(errUninitalizedAkeylessProvider)
  261. }
  262. ctx, err := a.contextWithToken(ctx)
  263. if err != nil {
  264. return nil, err
  265. }
  266. searchPath := ""
  267. if ref.Path != nil {
  268. searchPath = *ref.Path
  269. if !strings.HasPrefix(searchPath, "/") {
  270. searchPath = "/" + searchPath
  271. }
  272. if !strings.HasSuffix(searchPath, "/") {
  273. searchPath += "/"
  274. }
  275. }
  276. if ref.Name != nil {
  277. return a.findSecretsFromName(ctx, searchPath, *ref.Name)
  278. }
  279. if len(ref.Tags) > 0 {
  280. return a.getSecrets(ctx, searchPath, ref.Tags)
  281. }
  282. return nil, errors.New("unexpected find operator")
  283. }
  284. func (a *Akeyless) getSecrets(ctx context.Context, searchPath string, tags map[string]string) (map[string][]byte, error) {
  285. var potentialSecretsName []string
  286. for _, v := range tags {
  287. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v)
  288. if err != nil {
  289. return nil, err
  290. }
  291. if len(potentialSecrets) > 0 {
  292. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  293. }
  294. }
  295. if len(potentialSecretsName) == 0 {
  296. return nil, nil
  297. }
  298. secrets := make(map[string][]byte)
  299. for _, name := range potentialSecretsName {
  300. secretValue, err := a.Client.GetSecretByType(ctx, name, 0)
  301. if err != nil {
  302. return nil, err
  303. }
  304. if secretValue != "" {
  305. secrets[name] = []byte(secretValue)
  306. }
  307. }
  308. return secrets, nil
  309. }
  310. func (a *Akeyless) findSecretsFromName(ctx context.Context, searchPath string, ref esv1.FindName) (map[string][]byte, error) {
  311. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "")
  312. if err != nil {
  313. return nil, err
  314. }
  315. if len(potentialSecrets) == 0 {
  316. return nil, nil
  317. }
  318. secrets := make(map[string][]byte)
  319. matcher, err := find.New(ref)
  320. if err != nil {
  321. return nil, err
  322. }
  323. for _, name := range potentialSecrets {
  324. ok := matcher.MatchName(name)
  325. if ok {
  326. secretValue, err := a.Client.GetSecretByType(ctx, name, 0)
  327. if err != nil {
  328. return nil, err
  329. }
  330. if secretValue != "" {
  331. secrets[name] = []byte(secretValue)
  332. }
  333. }
  334. }
  335. return secrets, nil
  336. }
  337. // GetSecretMap implements store.Client.GetSecretMap Interface.
  338. // New version of GetSecretMap.
  339. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  340. if utils.IsNil(a.Client) {
  341. return nil, errors.New(errUninitalizedAkeylessProvider)
  342. }
  343. val, err := a.GetSecret(ctx, ref)
  344. if err != nil {
  345. return nil, err
  346. }
  347. // Maps the json data to a string:string map
  348. kv := make(map[string]string)
  349. err = json.Unmarshal(val, &kv)
  350. if err != nil {
  351. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  352. }
  353. // Converts values in K:V pairs into bytes, while leaving keys as strings
  354. secretData := make(map[string][]byte)
  355. for k, v := range kv {
  356. secretData[k] = []byte(v)
  357. }
  358. return secretData, nil
  359. }
  360. func (a *Akeyless) SecretExists(ctx context.Context, ref esv1.PushSecretRemoteRef) (bool, error) {
  361. if utils.IsNil(a.Client) {
  362. return false, errors.New(errUninitalizedAkeylessProvider)
  363. }
  364. secret, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: ref.GetRemoteKey()})
  365. if errors.Is(err, ErrItemNotExists) {
  366. return false, nil
  367. }
  368. if err != nil {
  369. return false, err
  370. }
  371. if ref.GetProperty() == "" {
  372. return true, nil
  373. }
  374. var secretMap map[string]any
  375. err = json.Unmarshal(secret, &secretMap)
  376. if err != nil {
  377. return false, err
  378. }
  379. _, ok := secretMap[ref.GetProperty()]
  380. return ok, nil
  381. }
  382. func initMapIfNotExist(psd esv1.PushSecretData, secretMapSize int) map[string]any {
  383. mapSize := 1
  384. if psd.GetProperty() == "" {
  385. mapSize = secretMapSize
  386. }
  387. return make(map[string]any, mapSize)
  388. }
  389. func (a *Akeyless) PushSecret(ctx context.Context, secret *corev1.Secret, psd esv1.PushSecretData) error {
  390. if utils.IsNil(a.Client) {
  391. return errors.New(errUninitalizedAkeylessProvider)
  392. }
  393. ctx, err := a.contextWithToken(ctx)
  394. if err != nil {
  395. return err
  396. }
  397. secretRemote, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: psd.GetRemoteKey()})
  398. isNotExists := errors.Is(err, ErrItemNotExists)
  399. if err != nil && !isNotExists {
  400. return err
  401. }
  402. var data map[string]any
  403. if isNotExists {
  404. data = initMapIfNotExist(psd, len(secret.Data))
  405. err = nil
  406. } else {
  407. err = json.Unmarshal(secretRemote, &data)
  408. }
  409. if err != nil {
  410. return err
  411. }
  412. if psd.GetProperty() == "" {
  413. for k, v := range secret.Data {
  414. data[k] = string(v)
  415. }
  416. } else if v, ok := secret.Data[psd.GetSecretKey()]; ok {
  417. data[psd.GetProperty()] = string(v)
  418. }
  419. dataByte, err := json.Marshal(data)
  420. if err != nil {
  421. return err
  422. }
  423. if bytes.Equal(dataByte, secretRemote) {
  424. return nil
  425. }
  426. if isNotExists {
  427. return a.Client.CreateSecret(ctx, psd.GetRemoteKey(), string(dataByte))
  428. }
  429. return a.Client.UpdateSecret(ctx, psd.GetRemoteKey(), string(dataByte))
  430. }
  431. func (a *Akeyless) DeleteSecret(ctx context.Context, psr esv1.PushSecretRemoteRef) error {
  432. if utils.IsNil(a.Client) {
  433. return errors.New(errUninitalizedAkeylessProvider)
  434. }
  435. ctx, err := a.contextWithToken(ctx)
  436. if err != nil {
  437. return err
  438. }
  439. item, err := a.Client.DescribeItem(ctx, psr.GetRemoteKey())
  440. if err != nil {
  441. return err
  442. }
  443. if item == nil || item.ItemTags == nil || !slices.Contains(*item.ItemTags, extSecretManagedTag) {
  444. return nil
  445. }
  446. if psr.GetProperty() == "" {
  447. err = a.Client.DeleteSecret(ctx, psr.GetRemoteKey())
  448. return err
  449. }
  450. secret, err := a.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: psr.GetRemoteKey()})
  451. if err != nil {
  452. return err
  453. }
  454. var secretMap map[string]any
  455. err = json.Unmarshal(secret, &secretMap)
  456. if err != nil {
  457. return err
  458. }
  459. delete(secretMap, psr.GetProperty())
  460. if len(secretMap) == 0 {
  461. err = a.Client.DeleteSecret(ctx, psr.GetRemoteKey())
  462. return err
  463. }
  464. byteSecretMap, err := json.Marshal(secretMap)
  465. if err != nil {
  466. return err
  467. }
  468. err = a.Client.UpdateSecret(ctx, psr.GetRemoteKey(), string(byteSecretMap))
  469. return err
  470. }
  471. func (a *akeylessBase) getAkeylessHTTPClient(ctx context.Context, provider *esv1.AkeylessProvider) (*http.Client, error) {
  472. client := &http.Client{Timeout: 30 * time.Second}
  473. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  474. return client, nil
  475. }
  476. cert, err := utils.FetchCACertFromSource(ctx, utils.CreateCertOpts{
  477. StoreKind: a.storeKind,
  478. Client: a.kube,
  479. Namespace: a.namespace,
  480. CABundle: provider.CABundle,
  481. CAProvider: provider.CAProvider,
  482. })
  483. if err != nil {
  484. return nil, err
  485. }
  486. caCertPool := x509.NewCertPool()
  487. ok := caCertPool.AppendCertsFromPEM(cert)
  488. if !ok {
  489. return nil, errors.New("failed to append caBundle")
  490. }
  491. tlsConf := &tls.Config{
  492. RootCAs: caCertPool,
  493. MinVersion: tls.VersionTLS12,
  494. }
  495. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  496. return client, nil
  497. }