akeyless.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "net/url"
  22. "strconv"
  23. "strings"
  24. "time"
  25. "github.com/akeylesslabs/akeyless-go/v3"
  26. "github.com/tidwall/gjson"
  27. corev1 "k8s.io/api/core/v1"
  28. "k8s.io/client-go/kubernetes"
  29. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  30. "sigs.k8s.io/controller-runtime/pkg/client"
  31. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  32. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  33. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  34. "github.com/external-secrets/external-secrets/pkg/find"
  35. "github.com/external-secrets/external-secrets/pkg/utils"
  36. )
  37. const (
  38. defaultAPIUrl = "https://api.akeyless.io"
  39. )
  40. // https://github.com/external-secrets/external-secrets/issues/644
  41. var _ esv1beta1.SecretsClient = &Akeyless{}
  42. var _ esv1beta1.Provider = &Provider{}
  43. // Provider satisfies the provider interface.
  44. type Provider struct{}
  45. // akeylessBase satisfies the provider.SecretsClient interface.
  46. type akeylessBase struct {
  47. kube client.Client
  48. store esv1beta1.GenericStore
  49. storeKind string
  50. corev1 typedcorev1.CoreV1Interface
  51. namespace string
  52. akeylessGwAPIURL string
  53. RestAPI *akeyless.V2ApiService
  54. }
  55. type Akeyless struct {
  56. Client akeylessVaultInterface
  57. url string
  58. }
  59. type akeylessVaultInterface interface {
  60. GetSecretByType(ctx context.Context, secretName, token string, version int32) (string, error)
  61. TokenFromSecretRef(ctx context.Context) (string, error)
  62. ListSecrets(ctx context.Context, path, tag, token string) ([]string, error)
  63. }
  64. func init() {
  65. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  66. Akeyless: &esv1beta1.AkeylessProvider{},
  67. })
  68. }
  69. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  70. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  71. return esv1beta1.SecretStoreReadOnly
  72. }
  73. // NewClient constructs a new secrets client based on the provided store.
  74. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  75. // controller-runtime/client does not support TokenRequest or other subresource APIs
  76. // so we need to construct our own client and use it to fetch tokens
  77. // (for Kubernetes service account token auth)
  78. restCfg, err := ctrlcfg.GetConfig()
  79. if err != nil {
  80. return nil, err
  81. }
  82. clientset, err := kubernetes.NewForConfig(restCfg)
  83. if err != nil {
  84. return nil, err
  85. }
  86. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  87. }
  88. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  89. storeSpec := store.GetSpec()
  90. akeylessSpec := storeSpec.Provider.Akeyless
  91. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  92. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  93. url, err := url.Parse(*akeylessGWApiURL)
  94. if err != nil {
  95. return fmt.Errorf(errInvalidAkeylessURL)
  96. }
  97. if url.Host == "" {
  98. return fmt.Errorf(errInvalidAkeylessURL)
  99. }
  100. }
  101. if akeylessSpec.Auth.KubernetesAuth != nil {
  102. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  103. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  104. return fmt.Errorf(errInvalidKubeSA, err)
  105. }
  106. }
  107. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  108. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  109. if err != nil {
  110. return err
  111. }
  112. }
  113. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  114. return fmt.Errorf("missing kubernetes auth-method access-id")
  115. }
  116. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  117. return fmt.Errorf("missing kubernetes config name")
  118. }
  119. return nil
  120. }
  121. accessID := akeylessSpec.Auth.SecretRef.AccessID
  122. err := utils.ValidateSecretSelector(store, accessID)
  123. if err != nil {
  124. return err
  125. }
  126. if accessID.Name == "" {
  127. return fmt.Errorf(errInvalidAkeylessAccessIDName)
  128. }
  129. if accessID.Key == "" {
  130. return fmt.Errorf(errInvalidAkeylessAccessIDKey)
  131. }
  132. accessType := akeylessSpec.Auth.SecretRef.AccessType
  133. err = utils.ValidateSecretSelector(store, accessType)
  134. if err != nil {
  135. return err
  136. }
  137. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  138. err = utils.ValidateSecretSelector(store, accessTypeParam)
  139. if err != nil {
  140. return err
  141. }
  142. return nil
  143. }
  144. func newClient(_ context.Context, store esv1beta1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  145. akl := &akeylessBase{
  146. kube: kube,
  147. store: store,
  148. namespace: namespace,
  149. corev1: corev1,
  150. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  151. }
  152. spec, err := GetAKeylessProvider(store)
  153. if err != nil {
  154. return nil, err
  155. }
  156. akeylessGwAPIURL := defaultAPIUrl
  157. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  158. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  159. }
  160. if spec.Auth == nil {
  161. return nil, fmt.Errorf("missing Auth in store config")
  162. }
  163. client, err := akl.getAkeylessHTTPClient(spec)
  164. if err != nil {
  165. return nil, err
  166. }
  167. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  168. HTTPClient: client,
  169. Servers: []akeyless.ServerConfiguration{
  170. {
  171. URL: akeylessGwAPIURL,
  172. },
  173. },
  174. }).V2Api
  175. akl.akeylessGwAPIURL = akeylessGwAPIURL
  176. akl.RestAPI = RestAPIClient
  177. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  178. }
  179. func (a *Akeyless) Close(_ context.Context) error {
  180. return nil
  181. }
  182. func (a *Akeyless) Validate() (esv1beta1.ValidationResult, error) {
  183. timeout := 15 * time.Second
  184. url := a.url
  185. if err := utils.NetworkValidate(url, timeout); err != nil {
  186. return esv1beta1.ValidationResultError, err
  187. }
  188. return esv1beta1.ValidationResultReady, nil
  189. }
  190. func (a *Akeyless) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  191. return fmt.Errorf("not implemented")
  192. }
  193. func (a *Akeyless) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  194. return fmt.Errorf("not implemented")
  195. }
  196. // Implements store.Client.GetSecret Interface.
  197. // Retrieves a secret with the secret name defined in ref.Name.
  198. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  199. if utils.IsNil(a.Client) {
  200. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  201. }
  202. token, err := a.Client.TokenFromSecretRef(ctx)
  203. if err != nil {
  204. return nil, err
  205. }
  206. version := int32(0)
  207. if ref.Version != "" {
  208. i, err := strconv.ParseInt(ref.Version, 10, 32)
  209. if err == nil {
  210. version = int32(i)
  211. }
  212. }
  213. value, err := a.Client.GetSecretByType(ctx, ref.Key, token, version)
  214. if err != nil {
  215. return nil, err
  216. }
  217. if ref.Property == "" {
  218. if value != "" {
  219. return []byte(value), nil
  220. }
  221. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  222. }
  223. // We need to search if a given key with a . exists before using gjson operations.
  224. idx := strings.Index(ref.Property, ".")
  225. if idx > -1 {
  226. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  227. val := gjson.Get(value, refProperty)
  228. if val.Exists() {
  229. return []byte(val.String()), nil
  230. }
  231. }
  232. val := gjson.Get(value, ref.Property)
  233. if !val.Exists() {
  234. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  235. }
  236. return []byte(val.String()), nil
  237. }
  238. // Implements store.Client.GetAllSecrets Interface.
  239. // Retrieves a all secrets with defined in ref.Name or tags.
  240. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  241. if utils.IsNil(a.Client) {
  242. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  243. }
  244. searchPath := ""
  245. if ref.Path != nil {
  246. searchPath = *ref.Path
  247. if !strings.HasPrefix(searchPath, "/") {
  248. searchPath = "/" + searchPath
  249. }
  250. if !strings.HasSuffix(searchPath, "/") {
  251. searchPath += "/"
  252. }
  253. }
  254. token, err := a.Client.TokenFromSecretRef(ctx)
  255. if err != nil {
  256. return nil, err
  257. }
  258. if ref.Name != nil {
  259. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "", token)
  260. if err != nil {
  261. return nil, err
  262. }
  263. if len(potentialSecrets) == 0 {
  264. return nil, nil
  265. }
  266. return a.findSecretsFromName(ctx, potentialSecrets, *ref.Name, token)
  267. }
  268. if len(ref.Tags) > 0 {
  269. var potentialSecretsName []string
  270. for _, v := range ref.Tags {
  271. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v, token)
  272. if err != nil {
  273. return nil, err
  274. }
  275. if len(potentialSecrets) > 0 {
  276. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  277. }
  278. }
  279. if len(potentialSecretsName) == 0 {
  280. return nil, nil
  281. }
  282. return a.getSecrets(ctx, potentialSecretsName, token)
  283. }
  284. return nil, errors.New("unexpected find operator")
  285. }
  286. func (a *Akeyless) getSecrets(ctx context.Context, candidates []string, token string) (map[string][]byte, error) {
  287. secrets := make(map[string][]byte)
  288. for _, name := range candidates {
  289. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  290. if err != nil {
  291. return nil, err
  292. }
  293. if secretValue != "" {
  294. secrets[name] = []byte(secretValue)
  295. }
  296. }
  297. return secrets, nil
  298. }
  299. func (a *Akeyless) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName, token string) (map[string][]byte, error) {
  300. secrets := make(map[string][]byte)
  301. matcher, err := find.New(ref)
  302. if err != nil {
  303. return nil, err
  304. }
  305. for _, name := range candidates {
  306. ok := matcher.MatchName(name)
  307. if ok {
  308. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  309. if err != nil {
  310. return nil, err
  311. }
  312. if secretValue != "" {
  313. secrets[name] = []byte(secretValue)
  314. }
  315. }
  316. }
  317. return secrets, nil
  318. }
  319. // Implements store.Client.GetSecretMap Interface.
  320. // New version of GetSecretMap.
  321. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  322. if utils.IsNil(a.Client) {
  323. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  324. }
  325. val, err := a.GetSecret(ctx, ref)
  326. if err != nil {
  327. return nil, err
  328. }
  329. // Maps the json data to a string:string map
  330. kv := make(map[string]string)
  331. err = json.Unmarshal(val, &kv)
  332. if err != nil {
  333. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  334. }
  335. // Converts values in K:V pairs into bytes, while leaving keys as strings
  336. secretData := make(map[string][]byte)
  337. for k, v := range kv {
  338. secretData[k] = []byte(v)
  339. }
  340. return secretData, nil
  341. }
  342. func (a *akeylessBase) getAkeylessHTTPClient(provider *esv1beta1.AkeylessProvider) (*http.Client, error) {
  343. client := &http.Client{Timeout: 30 * time.Second}
  344. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  345. return client, nil
  346. }
  347. caCertPool, err := a.getCACertPool(provider)
  348. if err != nil {
  349. return nil, err
  350. }
  351. tlsConf := &tls.Config{
  352. RootCAs: caCertPool,
  353. MinVersion: tls.VersionTLS12,
  354. }
  355. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  356. return client, nil
  357. }
  358. func (a *akeylessBase) getCACertPool(provider *esv1beta1.AkeylessProvider) (*x509.CertPool, error) {
  359. caCertPool := x509.NewCertPool()
  360. if len(provider.CABundle) > 0 {
  361. pem, err := base64decode(provider.CABundle)
  362. if err != nil {
  363. pem = provider.CABundle
  364. }
  365. ok := caCertPool.AppendCertsFromPEM(pem)
  366. if !ok {
  367. return nil, fmt.Errorf("failed to append cabundle")
  368. }
  369. }
  370. if provider.CAProvider != nil && a.storeKind == esv1beta1.ClusterSecretStoreKind && provider.CAProvider.Namespace == nil {
  371. return nil, fmt.Errorf("missing namespace on CAProvider secret")
  372. }
  373. if provider.CAProvider != nil {
  374. var cert []byte
  375. var err error
  376. switch provider.CAProvider.Type {
  377. case esv1beta1.CAProviderTypeSecret:
  378. cert, err = a.getCertFromSecret(provider)
  379. case esv1beta1.CAProviderTypeConfigMap:
  380. cert, err = a.getCertFromConfigMap(provider)
  381. default:
  382. err = fmt.Errorf("unknown caprovider type: %s", provider.CAProvider.Type)
  383. }
  384. if err != nil {
  385. return nil, err
  386. }
  387. pem, err := base64decode(cert)
  388. if err != nil {
  389. pem = cert
  390. }
  391. ok := caCertPool.AppendCertsFromPEM(pem)
  392. if !ok {
  393. return nil, fmt.Errorf("failed to append cabundle")
  394. }
  395. }
  396. return caCertPool, nil
  397. }
  398. func (a *akeylessBase) getCertFromSecret(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  399. secretRef := esmeta.SecretKeySelector{
  400. Name: provider.CAProvider.Name,
  401. Key: provider.CAProvider.Key,
  402. }
  403. if provider.CAProvider.Namespace != nil {
  404. secretRef.Namespace = provider.CAProvider.Namespace
  405. }
  406. ctx := context.Background()
  407. res, err := a.secretKeyRef(ctx, &secretRef)
  408. if err != nil {
  409. return nil, err
  410. }
  411. return []byte(res), nil
  412. }
  413. func (a *akeylessBase) getCertFromConfigMap(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  414. objKey := client.ObjectKey{
  415. Name: provider.CAProvider.Name,
  416. }
  417. if provider.CAProvider.Namespace != nil {
  418. objKey.Namespace = *provider.CAProvider.Namespace
  419. }
  420. configMapRef := &corev1.ConfigMap{}
  421. ctx := context.Background()
  422. err := a.kube.Get(ctx, objKey, configMapRef)
  423. if err != nil {
  424. return nil, fmt.Errorf("failed to get caprovider secret %s: %w", objKey.Name, err)
  425. }
  426. val, ok := configMapRef.Data[provider.CAProvider.Key]
  427. if !ok {
  428. return nil, fmt.Errorf("failed to get caprovider configmap %s -> %s", objKey.Name, provider.CAProvider.Key)
  429. }
  430. return []byte(val), nil
  431. }