auth.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package auth
  13. import (
  14. "context"
  15. "fmt"
  16. "github.com/aws/aws-sdk-go/aws"
  17. "github.com/aws/aws-sdk-go/aws/credentials"
  18. "github.com/aws/aws-sdk-go/aws/credentials/stscreds"
  19. "github.com/aws/aws-sdk-go/aws/defaults"
  20. "github.com/aws/aws-sdk-go/aws/request"
  21. "github.com/aws/aws-sdk-go/aws/session"
  22. "github.com/aws/aws-sdk-go/service/sts"
  23. "github.com/aws/aws-sdk-go/service/sts/stsiface"
  24. v1 "k8s.io/api/core/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. "k8s.io/client-go/kubernetes"
  27. ctrl "sigs.k8s.io/controller-runtime"
  28. "sigs.k8s.io/controller-runtime/pkg/client"
  29. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  30. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  31. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  32. )
  33. // Config contains configuration to create a new AWS provider.
  34. type Config struct {
  35. AssumeRole string
  36. Region string
  37. APIRetries int
  38. }
  39. type SessionCache struct {
  40. Name string
  41. Namespace string
  42. Kind string
  43. ResourceVersion string
  44. }
  45. var (
  46. log = ctrl.Log.WithName("provider").WithName("aws")
  47. sessions = make(map[SessionCache]*session.Session)
  48. EnableCache bool
  49. )
  50. const (
  51. roleARNAnnotation = "eks.amazonaws.com/role-arn"
  52. errInvalidClusterStoreMissingAKIDNamespace = "invalid ClusterSecretStore: missing AWS AccessKeyID Namespace"
  53. errInvalidClusterStoreMissingSAKNamespace = "invalid ClusterSecretStore: missing AWS SecretAccessKey Namespace"
  54. errFetchAKIDSecret = "could not fetch accessKeyID secret: %w"
  55. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  56. errMissingSAK = "missing SecretAccessKey"
  57. errMissingAKID = "missing AccessKeyID"
  58. )
  59. // New creates a new aws session based on the provided store
  60. // it uses the following authentication mechanisms in order:
  61. // * service-account token authentication via AssumeRoleWithWebIdentity
  62. // * static credentials from a Kind=Secret, optionally with doing a AssumeRole.
  63. // * sdk default provider chain, see: https://docs.aws.amazon.com/sdk-for-java/v1/developer-guide/credentials.html#credentials-default
  64. func New(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, assumeRoler STSProvider, jwtProvider jwtProviderFactory) (*session.Session, error) {
  65. prov, err := util.GetAWSProvider(store)
  66. if err != nil {
  67. return nil, err
  68. }
  69. var creds *credentials.Credentials
  70. // use credentials via service account token
  71. jwtAuth := prov.Auth.JWTAuth
  72. if jwtAuth != nil {
  73. creds, err = sessionFromServiceAccount(ctx, prov, store, kube, namespace, jwtProvider)
  74. if err != nil {
  75. return nil, err
  76. }
  77. }
  78. // use credentials from sercretRef
  79. secretRef := prov.Auth.SecretRef
  80. if secretRef != nil {
  81. log.V(1).Info("using credentials from secretRef")
  82. creds, err = sessionFromSecretRef(ctx, prov, store, kube, namespace)
  83. if err != nil {
  84. return nil, err
  85. }
  86. }
  87. config := aws.NewConfig().WithEndpointResolver(ResolveEndpoint())
  88. if creds != nil {
  89. config.WithCredentials(creds)
  90. }
  91. if prov.Region != "" {
  92. config.WithRegion(prov.Region)
  93. }
  94. sess, err := getAWSSession(config, prov, store, namespace)
  95. if err != nil {
  96. return nil, err
  97. }
  98. if prov.Role != "" {
  99. stsclient := assumeRoler(sess)
  100. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, prov.Role))
  101. }
  102. log.Info("using aws session", "region", *sess.Config.Region, "credentials", creds)
  103. return sess, nil
  104. }
  105. func sessionFromSecretRef(ctx context.Context, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, kube client.Client, namespace string) (*credentials.Credentials, error) {
  106. ke := client.ObjectKey{
  107. Name: prov.Auth.SecretRef.AccessKeyID.Name,
  108. Namespace: namespace, // default to ExternalSecret namespace
  109. }
  110. // only ClusterStore is allowed to set namespace (and then it's required)
  111. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  112. if prov.Auth.SecretRef.AccessKeyID.Namespace == nil {
  113. return nil, fmt.Errorf(errInvalidClusterStoreMissingAKIDNamespace)
  114. }
  115. ke.Namespace = *prov.Auth.SecretRef.AccessKeyID.Namespace
  116. }
  117. akSecret := v1.Secret{}
  118. err := kube.Get(ctx, ke, &akSecret)
  119. if err != nil {
  120. return nil, fmt.Errorf(errFetchAKIDSecret, err)
  121. }
  122. ke = client.ObjectKey{
  123. Name: prov.Auth.SecretRef.SecretAccessKey.Name,
  124. Namespace: namespace, // default to ExternalSecret namespace
  125. }
  126. // only ClusterStore is allowed to set namespace (and then it's required)
  127. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  128. if prov.Auth.SecretRef.SecretAccessKey.Namespace == nil {
  129. return nil, fmt.Errorf(errInvalidClusterStoreMissingSAKNamespace)
  130. }
  131. ke.Namespace = *prov.Auth.SecretRef.SecretAccessKey.Namespace
  132. }
  133. sakSecret := v1.Secret{}
  134. err = kube.Get(ctx, ke, &sakSecret)
  135. if err != nil {
  136. return nil, fmt.Errorf(errFetchSAKSecret, err)
  137. }
  138. sak := string(sakSecret.Data[prov.Auth.SecretRef.SecretAccessKey.Key])
  139. aks := string(akSecret.Data[prov.Auth.SecretRef.AccessKeyID.Key])
  140. if sak == "" {
  141. return nil, fmt.Errorf(errMissingSAK)
  142. }
  143. if aks == "" {
  144. return nil, fmt.Errorf(errMissingAKID)
  145. }
  146. return credentials.NewStaticCredentials(aks, sak, ""), err
  147. }
  148. func sessionFromServiceAccount(ctx context.Context, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, kube client.Client, namespace string, jwtProvider jwtProviderFactory) (*credentials.Credentials, error) {
  149. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  150. if prov.Auth.JWTAuth.ServiceAccountRef.Namespace == nil {
  151. return nil, fmt.Errorf("serviceAccountRef has no Namespace field (mandatory for ClusterSecretStore specs)")
  152. }
  153. namespace = *prov.Auth.JWTAuth.ServiceAccountRef.Namespace
  154. }
  155. name := prov.Auth.JWTAuth.ServiceAccountRef.Name
  156. sa := v1.ServiceAccount{}
  157. err := kube.Get(ctx, types.NamespacedName{
  158. Name: name,
  159. Namespace: namespace,
  160. }, &sa)
  161. if err != nil {
  162. return nil, err
  163. }
  164. // the service account is expected to have a well-known annotation
  165. // this is used as input to assumeRoleWithWebIdentity
  166. roleArn := sa.Annotations[roleARNAnnotation]
  167. if roleArn == "" {
  168. return nil, fmt.Errorf("an IAM role must be associated with service account %s (namespace: %s)", name, namespace)
  169. }
  170. jwtProv, err := jwtProvider(name, namespace, roleArn, prov.Region)
  171. if err != nil {
  172. return nil, err
  173. }
  174. log.V(1).Info("using credentials via service account", "role", roleArn, "region", prov.Region)
  175. return credentials.NewCredentials(jwtProv), nil
  176. }
  177. type jwtProviderFactory func(name, namespace, roleArn, region string) (credentials.Provider, error)
  178. // DefaultJWTProvider returns a credentials.Provider that calls the AssumeRoleWithWebidentity
  179. // controller-runtime/client does not support TokenRequest or other subresource APIs
  180. // so we need to construct our own client and use it to fetch tokens.
  181. func DefaultJWTProvider(name, namespace, roleArn, region string) (credentials.Provider, error) {
  182. cfg, err := ctrlcfg.GetConfig()
  183. if err != nil {
  184. return nil, err
  185. }
  186. clientset, err := kubernetes.NewForConfig(cfg)
  187. if err != nil {
  188. return nil, err
  189. }
  190. handlers := defaults.Handlers()
  191. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  192. awscfg := aws.NewConfig().WithEndpointResolver(ResolveEndpoint())
  193. if region != "" {
  194. awscfg.WithRegion(region)
  195. }
  196. sess, err := session.NewSessionWithOptions(session.Options{
  197. Config: *awscfg,
  198. SharedConfigState: session.SharedConfigDisable,
  199. Handlers: handlers,
  200. })
  201. if err != nil {
  202. return nil, err
  203. }
  204. tokenFetcher := &authTokenFetcher{
  205. Namespace: namespace,
  206. ServiceAccount: name,
  207. k8sClient: clientset.CoreV1(),
  208. }
  209. return stscreds.NewWebIdentityRoleProviderWithOptions(
  210. sts.New(sess), roleArn, "external-secrets-provider-aws", tokenFetcher), nil
  211. }
  212. type STSProvider func(*session.Session) stsiface.STSAPI
  213. func DefaultSTSProvider(sess *session.Session) stsiface.STSAPI {
  214. return sts.New(sess)
  215. }
  216. // getAWSSession check if an AWS session should be reused
  217. // it returns the aws session or an error.
  218. func getAWSSession(config *aws.Config, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, namespace string) (*session.Session, error) {
  219. if EnableCache {
  220. tmpSession := SessionCache{
  221. Name: store.GetObjectMeta().Name,
  222. Namespace: namespace,
  223. Kind: store.GetTypeMeta().Kind,
  224. ResourceVersion: store.GetObjectMeta().ResourceVersion,
  225. }
  226. _, ok := sessions[tmpSession]
  227. if ok {
  228. log.Info("reusing aws session", "SecretStore", tmpSession.Name, "namespace", tmpSession.Namespace, "kind", tmpSession.Kind, "resourceversion", tmpSession.ResourceVersion)
  229. sess := sessions[tmpSession]
  230. return sess, nil
  231. }
  232. handlers := defaults.Handlers()
  233. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  234. sess, err := session.NewSessionWithOptions(session.Options{
  235. Config: *config,
  236. Handlers: handlers,
  237. SharedConfigState: session.SharedConfigDisable,
  238. })
  239. if err != nil {
  240. return nil, err
  241. }
  242. sessions[tmpSession] = sess
  243. return sess, nil
  244. }
  245. handlers := defaults.Handlers()
  246. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  247. sess, err := session.NewSessionWithOptions(session.Options{
  248. Config: *config,
  249. Handlers: handlers,
  250. SharedConfigState: session.SharedConfigDisable,
  251. })
  252. if err != nil {
  253. return nil, err
  254. }
  255. return sess, nil
  256. }