validate.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  18. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  19. "github.com/external-secrets/external-secrets/pkg/utils"
  20. )
  21. const (
  22. errInvalidCredentials = "invalid vault credentials: %w"
  23. errInvalidStore = "invalid store"
  24. errInvalidStoreSpec = "invalid store spec"
  25. errInvalidStoreProv = "invalid store provider"
  26. errInvalidVaultProv = "invalid vault provider"
  27. errInvalidAppRoleRef = "invalid Auth.AppRole.RoleRef: %w"
  28. errInvalidAppRoleSec = "invalid Auth.AppRole.SecretRef: %w"
  29. errInvalidClientCert = "invalid Auth.Cert.ClientCert: %w"
  30. errInvalidCertSec = "invalid Auth.Cert.SecretRef: %w"
  31. errInvalidJwtSec = "invalid Auth.Jwt.SecretRef: %w"
  32. errInvalidJwtK8sSA = "invalid Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef: %w"
  33. errInvalidKubeSA = "invalid Auth.Kubernetes.ServiceAccountRef: %w"
  34. errInvalidKubeSec = "invalid Auth.Kubernetes.SecretRef: %w"
  35. errInvalidLdapSec = "invalid Auth.Ldap.SecretRef: %w"
  36. errInvalidTokenRef = "invalid Auth.TokenSecretRef: %w"
  37. errInvalidUserPassSec = "invalid Auth.UserPass.SecretRef: %w"
  38. errInvalidClientTLSCert = "invalid ClientTLS.ClientCert: %w"
  39. errInvalidClientTLSSecret = "invalid ClientTLS.SecretRef: %w"
  40. errInvalidClientTLS = "when provided, both ClientTLS.ClientCert and ClientTLS.SecretRef should be provided"
  41. )
  42. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  43. if store == nil {
  44. return nil, errors.New(errInvalidStore)
  45. }
  46. spc := store.GetSpec()
  47. if spc == nil {
  48. return nil, errors.New(errInvalidStoreSpec)
  49. }
  50. if spc.Provider == nil {
  51. return nil, errors.New(errInvalidStoreProv)
  52. }
  53. vaultProvider := spc.Provider.Vault
  54. if vaultProvider == nil {
  55. return nil, errors.New(errInvalidVaultProv)
  56. }
  57. if vaultProvider.Auth.AppRole != nil {
  58. // check SecretRef for valid configuration
  59. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.AppRole.SecretRef); err != nil {
  60. return nil, fmt.Errorf(errInvalidAppRoleSec, err)
  61. }
  62. // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
  63. if vaultProvider.Auth.AppRole.RoleID == "" { // prevents further RoleID tests if .auth.appRole.roleId is given
  64. if vaultProvider.Auth.AppRole.RoleRef != nil { // check RoleRef for valid configuration
  65. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.AppRole.RoleRef); err != nil {
  66. return nil, fmt.Errorf(errInvalidAppRoleRef, err)
  67. }
  68. } else { // we ran out of ways to get RoleID. return an appropriate error
  69. return nil, errors.New(errInvalidAppRoleID)
  70. }
  71. }
  72. }
  73. if vaultProvider.Auth.Cert != nil {
  74. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Cert.ClientCert); err != nil {
  75. return nil, fmt.Errorf(errInvalidClientCert, err)
  76. }
  77. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Cert.SecretRef); err != nil {
  78. return nil, fmt.Errorf(errInvalidCertSec, err)
  79. }
  80. }
  81. if vaultProvider.Auth.Jwt != nil {
  82. if vaultProvider.Auth.Jwt.SecretRef != nil {
  83. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Jwt.SecretRef); err != nil {
  84. return nil, fmt.Errorf(errInvalidJwtSec, err)
  85. }
  86. } else if vaultProvider.Auth.Jwt.KubernetesServiceAccountToken != nil {
  87. if err := utils.ValidateReferentServiceAccountSelector(store, vaultProvider.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef); err != nil {
  88. return nil, fmt.Errorf(errInvalidJwtK8sSA, err)
  89. }
  90. } else {
  91. return nil, errors.New(errJwtNoTokenSource)
  92. }
  93. }
  94. if vaultProvider.Auth.Kubernetes != nil {
  95. if vaultProvider.Auth.Kubernetes.ServiceAccountRef != nil {
  96. if err := utils.ValidateReferentServiceAccountSelector(store, *vaultProvider.Auth.Kubernetes.ServiceAccountRef); err != nil {
  97. return nil, fmt.Errorf(errInvalidKubeSA, err)
  98. }
  99. }
  100. if vaultProvider.Auth.Kubernetes.SecretRef != nil {
  101. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Kubernetes.SecretRef); err != nil {
  102. return nil, fmt.Errorf(errInvalidKubeSec, err)
  103. }
  104. }
  105. }
  106. if vaultProvider.Auth.Ldap != nil {
  107. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Ldap.SecretRef); err != nil {
  108. return nil, fmt.Errorf(errInvalidLdapSec, err)
  109. }
  110. }
  111. if vaultProvider.Auth.UserPass != nil {
  112. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.UserPass.SecretRef); err != nil {
  113. return nil, fmt.Errorf(errInvalidUserPassSec, err)
  114. }
  115. }
  116. if vaultProvider.Auth.TokenSecretRef != nil {
  117. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.TokenSecretRef); err != nil {
  118. return nil, fmt.Errorf(errInvalidTokenRef, err)
  119. }
  120. }
  121. if vaultProvider.Auth.Iam != nil {
  122. if vaultProvider.Auth.Iam.JWTAuth != nil {
  123. if vaultProvider.Auth.Iam.JWTAuth.ServiceAccountRef != nil {
  124. if err := utils.ValidateReferentServiceAccountSelector(store, *vaultProvider.Auth.Iam.JWTAuth.ServiceAccountRef); err != nil {
  125. return nil, fmt.Errorf(errInvalidTokenRef, err)
  126. }
  127. }
  128. }
  129. if vaultProvider.Auth.Iam.SecretRef != nil {
  130. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Iam.SecretRef.AccessKeyID); err != nil {
  131. return nil, fmt.Errorf(errInvalidTokenRef, err)
  132. }
  133. if err := utils.ValidateReferentSecretSelector(store, vaultProvider.Auth.Iam.SecretRef.SecretAccessKey); err != nil {
  134. return nil, fmt.Errorf(errInvalidTokenRef, err)
  135. }
  136. if vaultProvider.Auth.Iam.SecretRef.SessionToken != nil {
  137. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.Auth.Iam.SecretRef.SessionToken); err != nil {
  138. return nil, fmt.Errorf(errInvalidTokenRef, err)
  139. }
  140. }
  141. }
  142. }
  143. if vaultProvider.ClientTLS.CertSecretRef != nil && vaultProvider.ClientTLS.KeySecretRef != nil {
  144. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.ClientTLS.CertSecretRef); err != nil {
  145. return nil, fmt.Errorf(errInvalidClientTLSCert, err)
  146. }
  147. if err := utils.ValidateReferentSecretSelector(store, *vaultProvider.ClientTLS.KeySecretRef); err != nil {
  148. return nil, fmt.Errorf(errInvalidClientTLSSecret, err)
  149. }
  150. } else if vaultProvider.ClientTLS.CertSecretRef != nil || vaultProvider.ClientTLS.KeySecretRef != nil {
  151. return nil, errors.New(errInvalidClientTLS)
  152. }
  153. return nil, nil
  154. }
  155. func (c *client) Validate() (esv1beta1.ValidationResult, error) {
  156. // when using referent namespace we can not validate the token
  157. // because the namespace is not known yet when Validate() is called
  158. // from the SecretStore controller.
  159. if c.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(c.store) {
  160. return esv1beta1.ValidationResultUnknown, nil
  161. }
  162. _, err := checkToken(context.Background(), c.token)
  163. if err != nil {
  164. return esv1beta1.ValidationResultError, fmt.Errorf(errInvalidCredentials, err)
  165. }
  166. return esv1beta1.ValidationResultReady, nil
  167. }