vault.go 33 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "os"
  22. "strconv"
  23. "strings"
  24. "github.com/go-logr/logr"
  25. vault "github.com/hashicorp/vault/api"
  26. approle "github.com/hashicorp/vault/api/auth/approle"
  27. authkubernetes "github.com/hashicorp/vault/api/auth/kubernetes"
  28. authldap "github.com/hashicorp/vault/api/auth/ldap"
  29. "github.com/tidwall/gjson"
  30. authenticationv1 "k8s.io/api/authentication/v1"
  31. corev1 "k8s.io/api/core/v1"
  32. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  33. "k8s.io/apimachinery/pkg/types"
  34. "k8s.io/client-go/kubernetes"
  35. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  36. ctrl "sigs.k8s.io/controller-runtime"
  37. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  38. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  39. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  40. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  41. "github.com/external-secrets/external-secrets/pkg/find"
  42. "github.com/external-secrets/external-secrets/pkg/utils"
  43. )
  44. var (
  45. _ esv1beta1.Provider = &connector{}
  46. _ esv1beta1.SecretsClient = &client{}
  47. )
  48. const (
  49. serviceAccTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/token"
  50. errVaultStore = "received invalid Vault SecretStore resource: %w"
  51. errVaultClient = "cannot setup new vault client: %w"
  52. errVaultCert = "cannot set Vault CA certificate: %w"
  53. errReadSecret = "cannot read secret data from Vault: %w"
  54. errAuthFormat = "cannot initialize Vault client: no valid auth method specified"
  55. errInvalidCredentials = "invalid vault credentials: %w"
  56. errDataField = "failed to find data field"
  57. errJSONUnmarshall = "failed to unmarshall JSON"
  58. errPathInvalid = "provided Path isn't a valid kv v2 path"
  59. errSecretFormat = "secret data not in expected format"
  60. errUnexpectedKey = "unexpected key in data: %s"
  61. errVaultToken = "cannot parse Vault authentication token: %w"
  62. errVaultRequest = "error from Vault request: %w"
  63. errServiceAccount = "cannot read Kubernetes service account token from file system: %w"
  64. errJwtNoTokenSource = "neither `secretRef` nor `kubernetesServiceAccountToken` was supplied as token source for jwt authentication"
  65. errUnsupportedKvVersion = "cannot perform find operations with kv version v1"
  66. errNotFound = "secret not found"
  67. errGetKubeSA = "cannot get Kubernetes service account %q: %w"
  68. errGetKubeSASecrets = "cannot find secrets bound to service account: %q"
  69. errGetKubeSANoToken = "cannot find token in secrets bound to service account: %q"
  70. errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
  71. errGetKubeSecret = "cannot get Kubernetes secret %q: %w"
  72. errSecretKeyFmt = "cannot find secret data for key: %q"
  73. errConfigMapFmt = "cannot find config map data for key: %q"
  74. errClientTLSAuth = "error from Client TLS Auth: %q"
  75. errVaultRevokeToken = "error while revoking token: %w"
  76. errUnknownCAProvider = "unknown caProvider type given"
  77. errCANamespace = "cannot read secret for CAProvider due to missing namespace on kind ClusterSecretStore"
  78. errInvalidStore = "invalid store"
  79. errInvalidStoreSpec = "invalid store spec"
  80. errInvalidStoreProv = "invalid store provider"
  81. errInvalidVaultProv = "invalid vault provider"
  82. errInvalidAppRoleSec = "invalid Auth.AppRole.SecretRef: %w"
  83. errInvalidClientCert = "invalid Auth.Cert.ClientCert: %w"
  84. errInvalidCertSec = "invalid Auth.Cert.SecretRef: %w"
  85. errInvalidJwtSec = "invalid Auth.Jwt.SecretRef: %w"
  86. errInvalidJwtK8sSA = "invalid Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef: %w"
  87. errInvalidKubeSA = "invalid Auth.Kubernetes.ServiceAccountRef: %w"
  88. errInvalidKubeSec = "invalid Auth.Kubernetes.SecretRef: %w"
  89. errInvalidLdapSec = "invalid Auth.Ldap.SecretRef: %w"
  90. errInvalidTokenRef = "invalid Auth.TokenSecretRef: %w"
  91. )
  92. // https://github.com/external-secrets/external-secrets/issues/644
  93. var _ esv1beta1.SecretsClient = &client{}
  94. var _ esv1beta1.Provider = &connector{}
  95. type Auth interface {
  96. Login(ctx context.Context, authMethod vault.AuthMethod) (*vault.Secret, error)
  97. }
  98. type Token interface {
  99. RevokeSelfWithContext(ctx context.Context, token string) error
  100. LookupSelfWithContext(ctx context.Context) (*vault.Secret, error)
  101. }
  102. type Logical interface {
  103. ReadWithDataWithContext(ctx context.Context, path string, data map[string][]string) (*vault.Secret, error)
  104. ListWithContext(ctx context.Context, path string) (*vault.Secret, error)
  105. WriteWithContext(ctx context.Context, path string, data map[string]interface{}) (*vault.Secret, error)
  106. }
  107. type Client interface {
  108. SetToken(v string)
  109. Token() string
  110. ClearToken()
  111. Auth() Auth
  112. Logical() Logical
  113. AuthToken() Token
  114. SetNamespace(namespace string)
  115. AddHeader(key, value string)
  116. }
  117. type VClient struct {
  118. setToken func(v string)
  119. token func() string
  120. clearToken func()
  121. auth Auth
  122. logical Logical
  123. authToken Token
  124. setNamespace func(namespace string)
  125. addHeader func(key, value string)
  126. }
  127. func (v VClient) AddHeader(key, value string) {
  128. v.addHeader(key, value)
  129. }
  130. func (v VClient) SetNamespace(namespace string) {
  131. v.setNamespace(namespace)
  132. }
  133. func (v VClient) ClearToken() {
  134. v.clearToken()
  135. }
  136. func (v VClient) Token() string {
  137. return v.token()
  138. }
  139. func (v VClient) SetToken(token string) {
  140. v.setToken(token)
  141. }
  142. func (v VClient) Auth() Auth {
  143. return v.auth
  144. }
  145. func (v VClient) AuthToken() Token {
  146. return v.authToken
  147. }
  148. func (v VClient) Logical() Logical {
  149. return v.logical
  150. }
  151. type client struct {
  152. kube kclient.Client
  153. store *esv1beta1.VaultProvider
  154. log logr.Logger
  155. corev1 typedcorev1.CoreV1Interface
  156. client Client
  157. auth Auth
  158. logical Logical
  159. token Token
  160. namespace string
  161. storeKind string
  162. }
  163. func init() {
  164. esv1beta1.Register(&connector{
  165. newVaultClient: newVaultClient,
  166. }, &esv1beta1.SecretStoreProvider{
  167. Vault: &esv1beta1.VaultProvider{},
  168. })
  169. }
  170. func newVaultClient(c *vault.Config) (Client, error) {
  171. cl, err := vault.NewClient(c)
  172. if err != nil {
  173. return nil, err
  174. }
  175. auth := cl.Auth()
  176. logical := cl.Logical()
  177. token := cl.Auth().Token()
  178. out := VClient{
  179. setToken: cl.SetToken,
  180. token: cl.Token,
  181. clearToken: cl.ClearToken,
  182. auth: auth,
  183. authToken: token,
  184. logical: logical,
  185. setNamespace: cl.SetNamespace,
  186. addHeader: cl.AddHeader,
  187. }
  188. return out, nil
  189. }
  190. type connector struct {
  191. newVaultClient func(c *vault.Config) (Client, error)
  192. }
  193. func (c *connector) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  194. // controller-runtime/client does not support TokenRequest or other subresource APIs
  195. // so we need to construct our own client and use it to fetch tokens
  196. // (for Kubernetes service account token auth)
  197. restCfg, err := ctrlcfg.GetConfig()
  198. if err != nil {
  199. return nil, err
  200. }
  201. clientset, err := kubernetes.NewForConfig(restCfg)
  202. if err != nil {
  203. return nil, err
  204. }
  205. return c.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  206. }
  207. func (c *connector) newClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  208. storeSpec := store.GetSpec()
  209. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  210. return nil, errors.New(errVaultStore)
  211. }
  212. vaultSpec := storeSpec.Provider.Vault
  213. vStore := &client{
  214. kube: kube,
  215. corev1: corev1,
  216. store: vaultSpec,
  217. log: ctrl.Log.WithName("provider").WithName("vault"),
  218. namespace: namespace,
  219. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  220. }
  221. cfg, err := vStore.newConfig()
  222. if err != nil {
  223. return nil, err
  224. }
  225. client, err := c.newVaultClient(cfg)
  226. if err != nil {
  227. return nil, fmt.Errorf(errVaultClient, err)
  228. }
  229. if vaultSpec.Namespace != nil {
  230. client.SetNamespace(*vaultSpec.Namespace)
  231. }
  232. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  233. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  234. }
  235. vStore.client = client
  236. vStore.auth = client.Auth()
  237. vStore.logical = client.Logical()
  238. vStore.token = client.AuthToken()
  239. // allow SecretStore controller validation to pass
  240. // when using referent namespace.
  241. if vStore.storeKind == esv1beta1.ClusterSecretStoreKind && vStore.namespace == "" && isReferentSpec(vaultSpec) {
  242. return vStore, nil
  243. }
  244. if err := vStore.setAuth(ctx, cfg); err != nil {
  245. return nil, err
  246. }
  247. return vStore, nil
  248. }
  249. func (c *connector) ValidateStore(store esv1beta1.GenericStore) error {
  250. if store == nil {
  251. return fmt.Errorf(errInvalidStore)
  252. }
  253. spc := store.GetSpec()
  254. if spc == nil {
  255. return fmt.Errorf(errInvalidStoreSpec)
  256. }
  257. if spc.Provider == nil {
  258. return fmt.Errorf(errInvalidStoreProv)
  259. }
  260. p := spc.Provider.Vault
  261. if p == nil {
  262. return fmt.Errorf(errInvalidVaultProv)
  263. }
  264. if p.Auth.AppRole != nil {
  265. if err := utils.ValidateReferentSecretSelector(store, p.Auth.AppRole.SecretRef); err != nil {
  266. return fmt.Errorf(errInvalidAppRoleSec, err)
  267. }
  268. }
  269. if p.Auth.Cert != nil {
  270. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.ClientCert); err != nil {
  271. return fmt.Errorf(errInvalidClientCert, err)
  272. }
  273. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.SecretRef); err != nil {
  274. return fmt.Errorf(errInvalidCertSec, err)
  275. }
  276. }
  277. if p.Auth.Jwt != nil {
  278. if p.Auth.Jwt.SecretRef != nil {
  279. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Jwt.SecretRef); err != nil {
  280. return fmt.Errorf(errInvalidJwtSec, err)
  281. }
  282. } else if p.Auth.Jwt.KubernetesServiceAccountToken != nil {
  283. if err := utils.ValidateReferentServiceAccountSelector(store, p.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef); err != nil {
  284. return fmt.Errorf(errInvalidJwtK8sSA, err)
  285. }
  286. } else {
  287. return fmt.Errorf(errJwtNoTokenSource)
  288. }
  289. }
  290. if p.Auth.Kubernetes != nil {
  291. if p.Auth.Kubernetes.ServiceAccountRef != nil {
  292. if err := utils.ValidateReferentServiceAccountSelector(store, *p.Auth.Kubernetes.ServiceAccountRef); err != nil {
  293. return fmt.Errorf(errInvalidKubeSA, err)
  294. }
  295. }
  296. if p.Auth.Kubernetes.SecretRef != nil {
  297. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Kubernetes.SecretRef); err != nil {
  298. return fmt.Errorf(errInvalidKubeSec, err)
  299. }
  300. }
  301. }
  302. if p.Auth.Ldap != nil {
  303. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Ldap.SecretRef); err != nil {
  304. return fmt.Errorf(errInvalidLdapSec, err)
  305. }
  306. }
  307. if p.Auth.TokenSecretRef != nil {
  308. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.TokenSecretRef); err != nil {
  309. return fmt.Errorf(errInvalidTokenRef, err)
  310. }
  311. }
  312. return nil
  313. }
  314. // Empty GetAllSecrets.
  315. // GetAllSecrets
  316. // First load all secrets from secretStore path configuration.
  317. // Then, gets secrets from a matching name or matching custom_metadata.
  318. func (v *client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  319. if v.store.Version == esv1beta1.VaultKVStoreV1 {
  320. return nil, errors.New(errUnsupportedKvVersion)
  321. }
  322. searchPath := ""
  323. if ref.Path != nil {
  324. searchPath = *ref.Path + "/"
  325. }
  326. potentialSecrets, err := v.listSecrets(ctx, searchPath)
  327. if err != nil {
  328. return nil, err
  329. }
  330. if ref.Name != nil {
  331. return v.findSecretsFromName(ctx, potentialSecrets, *ref.Name)
  332. }
  333. return v.findSecretsFromTags(ctx, potentialSecrets, ref.Tags)
  334. }
  335. func (v *client) findSecretsFromTags(ctx context.Context, candidates []string, tags map[string]string) (map[string][]byte, error) {
  336. secrets := make(map[string][]byte)
  337. for _, name := range candidates {
  338. match := true
  339. metadata, err := v.readSecretMetadata(ctx, name)
  340. if err != nil {
  341. return nil, err
  342. }
  343. for tk, tv := range tags {
  344. p, ok := metadata[tk]
  345. if !ok || p != tv {
  346. match = false
  347. break
  348. }
  349. }
  350. if match {
  351. secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  352. if err != nil {
  353. return nil, err
  354. }
  355. secrets[name] = secret
  356. }
  357. }
  358. return secrets, nil
  359. }
  360. func (v *client) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName) (map[string][]byte, error) {
  361. secrets := make(map[string][]byte)
  362. matcher, err := find.New(ref)
  363. if err != nil {
  364. return nil, err
  365. }
  366. for _, name := range candidates {
  367. ok := matcher.MatchName(name)
  368. if ok {
  369. secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  370. if err != nil {
  371. return nil, err
  372. }
  373. secrets[name] = secret
  374. }
  375. }
  376. return secrets, nil
  377. }
  378. func (v *client) listSecrets(ctx context.Context, path string) ([]string, error) {
  379. secrets := make([]string, 0)
  380. url, err := v.buildMetadataPath(path)
  381. if err != nil {
  382. return nil, err
  383. }
  384. secret, err := v.logical.ListWithContext(ctx, url)
  385. if err != nil {
  386. return nil, fmt.Errorf(errReadSecret, err)
  387. }
  388. t, ok := secret.Data["keys"]
  389. if !ok {
  390. return nil, nil
  391. }
  392. paths := t.([]interface{})
  393. for _, p := range paths {
  394. strPath := p.(string)
  395. fullPath := path + strPath // because path always ends with a /
  396. if path == "" {
  397. fullPath = strPath
  398. }
  399. // Recurrently find secrets
  400. if !strings.HasSuffix(p.(string), "/") {
  401. secrets = append(secrets, fullPath)
  402. } else {
  403. partial, err := v.listSecrets(ctx, fullPath)
  404. if err != nil {
  405. return nil, err
  406. }
  407. secrets = append(secrets, partial...)
  408. }
  409. }
  410. return secrets, nil
  411. }
  412. func (v *client) readSecretMetadata(ctx context.Context, path string) (map[string]string, error) {
  413. metadata := make(map[string]string)
  414. url, err := v.buildMetadataPath(path)
  415. if err != nil {
  416. return nil, err
  417. }
  418. secret, err := v.logical.ReadWithDataWithContext(ctx, url, nil)
  419. if err != nil {
  420. return nil, fmt.Errorf(errReadSecret, err)
  421. }
  422. if secret == nil {
  423. return nil, errors.New(errNotFound)
  424. }
  425. t, ok := secret.Data["custom_metadata"]
  426. if !ok {
  427. return nil, nil
  428. }
  429. d, ok := t.(map[string]interface{})
  430. if !ok {
  431. return metadata, nil
  432. }
  433. for k, v := range d {
  434. metadata[k] = v.(string)
  435. }
  436. return metadata, nil
  437. }
  438. // GetSecret supports two types:
  439. // 1. get the full secret as json-encoded value
  440. // by leaving the ref.Property empty.
  441. // 2. get a key from the secret.
  442. // Nested values are supported by specifying a gjson expression
  443. func (v *client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  444. data, err := v.readSecret(ctx, ref.Key, ref.Version)
  445. if err != nil {
  446. return nil, err
  447. }
  448. jsonStr, err := json.Marshal(data)
  449. if err != nil {
  450. return nil, err
  451. }
  452. // (1): return raw json if no property is defined
  453. if ref.Property == "" {
  454. return jsonStr, nil
  455. }
  456. // For backwards compatibility we want the
  457. // actual keys to take precedence over gjson syntax
  458. // (2): extract key from secret with property
  459. if _, ok := data[ref.Property]; ok {
  460. return getTypedKey(data, ref.Property)
  461. }
  462. // (3): extract key from secret using gjson
  463. val := gjson.Get(string(jsonStr), ref.Property)
  464. if !val.Exists() {
  465. return nil, fmt.Errorf(errSecretKeyFmt, ref.Property)
  466. }
  467. return []byte(val.String()), nil
  468. }
  469. // GetSecretMap supports two modes of operation:
  470. // 1. get the full secret from the vault data payload (by leaving .property empty).
  471. // 2. extract key/value pairs from a (nested) object.
  472. func (v *client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  473. data, err := v.GetSecret(ctx, ref)
  474. if err != nil {
  475. return nil, err
  476. }
  477. var secretData map[string]interface{}
  478. err = json.Unmarshal(data, &secretData)
  479. if err != nil {
  480. return nil, err
  481. }
  482. byteMap := make(map[string][]byte, len(secretData))
  483. for k := range secretData {
  484. byteMap[k], err = getTypedKey(secretData, k)
  485. if err != nil {
  486. return nil, err
  487. }
  488. }
  489. return byteMap, nil
  490. }
  491. func getTypedKey(data map[string]interface{}, key string) ([]byte, error) {
  492. v, ok := data[key]
  493. if !ok {
  494. return nil, fmt.Errorf(errUnexpectedKey, key)
  495. }
  496. switch t := v.(type) {
  497. case string:
  498. return []byte(t), nil
  499. case map[string]interface{}:
  500. return json.Marshal(t)
  501. case []byte:
  502. return t, nil
  503. // also covers int and float32 due to json.Marshal
  504. case float64:
  505. return []byte(strconv.FormatFloat(t, 'f', -1, 64)), nil
  506. case bool:
  507. return []byte(strconv.FormatBool(t)), nil
  508. case nil:
  509. return []byte(nil), nil
  510. default:
  511. return nil, errors.New(errSecretFormat)
  512. }
  513. }
  514. func (v *client) Close(ctx context.Context) error {
  515. // Revoke the token if we have one set and it wasn't sourced from a TokenSecretRef
  516. if v.client.Token() != "" && v.store.Auth.TokenSecretRef == nil {
  517. revoke, err := checkToken(ctx, v)
  518. if err != nil {
  519. return fmt.Errorf(errVaultRevokeToken, err)
  520. }
  521. if revoke {
  522. err = v.token.RevokeSelfWithContext(ctx, v.client.Token())
  523. if err != nil {
  524. return fmt.Errorf(errVaultRevokeToken, err)
  525. }
  526. v.client.ClearToken()
  527. }
  528. }
  529. return nil
  530. }
  531. func isReferentSpec(prov *esv1beta1.VaultProvider) bool {
  532. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  533. return true
  534. }
  535. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  536. return true
  537. }
  538. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  539. return true
  540. }
  541. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  542. return true
  543. }
  544. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  545. return true
  546. }
  547. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  548. return true
  549. }
  550. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  551. return true
  552. }
  553. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  554. return true
  555. }
  556. return false
  557. }
  558. func (v *client) Validate() (esv1beta1.ValidationResult, error) {
  559. // when using referent namespace we can not validate the token
  560. // because the namespace is not known yet when Validate() is called
  561. // from the SecretStore controller.
  562. if v.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(v.store) {
  563. return esv1beta1.ValidationResultUnknown, nil
  564. }
  565. _, err := checkToken(context.Background(), v)
  566. if err != nil {
  567. return esv1beta1.ValidationResultError, fmt.Errorf(errInvalidCredentials, err)
  568. }
  569. return esv1beta1.ValidationResultReady, nil
  570. }
  571. func (v *client) buildMetadataPath(path string) (string, error) {
  572. var url string
  573. if v.store.Path == nil && !strings.Contains(path, "data") {
  574. return "", fmt.Errorf(errPathInvalid)
  575. }
  576. if v.store.Path == nil {
  577. path = strings.Replace(path, "data", "metadata", 1)
  578. url = path
  579. } else {
  580. url = fmt.Sprintf("%s/metadata/%s", *v.store.Path, path)
  581. }
  582. return url, nil
  583. }
  584. func (v *client) buildPath(path string) string {
  585. optionalMount := v.store.Path
  586. origPath := strings.Split(path, "/")
  587. newPath := make([]string, 0)
  588. cursor := 0
  589. if optionalMount != nil && origPath[0] != *optionalMount {
  590. // Default case before path was optional
  591. // Ensure that the requested path includes the SecretStores paths as prefix
  592. newPath = append(newPath, *optionalMount)
  593. } else {
  594. newPath = append(newPath, origPath[cursor])
  595. cursor++
  596. }
  597. if v.store.Version == esv1beta1.VaultKVStoreV2 {
  598. // Add the required `data` part of the URL for the v2 API
  599. if len(origPath) < 2 || origPath[1] != "data" {
  600. newPath = append(newPath, "data")
  601. }
  602. }
  603. newPath = append(newPath, origPath[cursor:]...)
  604. returnPath := strings.Join(newPath, "/")
  605. return returnPath
  606. }
  607. func (v *client) readSecret(ctx context.Context, path, version string) (map[string]interface{}, error) {
  608. dataPath := v.buildPath(path)
  609. // path formated according to vault docs for v1 and v2 API
  610. // v1: https://www.vaultproject.io/api-docs/secret/kv/kv-v1#read-secret
  611. // v2: https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  612. var params map[string][]string
  613. if version != "" {
  614. params = make(map[string][]string)
  615. params["version"] = []string{version}
  616. }
  617. vaultSecret, err := v.logical.ReadWithDataWithContext(ctx, dataPath, params)
  618. if err != nil {
  619. return nil, fmt.Errorf(errReadSecret, err)
  620. }
  621. if vaultSecret == nil {
  622. return nil, errors.New(errNotFound)
  623. }
  624. secretData := vaultSecret.Data
  625. if v.store.Version == esv1beta1.VaultKVStoreV2 {
  626. // Vault KV2 has data embedded within sub-field
  627. // reference - https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  628. dataInt, ok := vaultSecret.Data["data"]
  629. if !ok {
  630. return nil, errors.New(errDataField)
  631. }
  632. secretData, ok = dataInt.(map[string]interface{})
  633. if !ok {
  634. return nil, errors.New(errJSONUnmarshall)
  635. }
  636. }
  637. return secretData, nil
  638. }
  639. func (v *client) newConfig() (*vault.Config, error) {
  640. cfg := vault.DefaultConfig()
  641. cfg.Address = v.store.Server
  642. // In a controller-runtime context, we rely on the reconciliation process for retrying
  643. cfg.MaxRetries = 0
  644. if len(v.store.CABundle) == 0 && v.store.CAProvider == nil {
  645. return cfg, nil
  646. }
  647. caCertPool := x509.NewCertPool()
  648. if len(v.store.CABundle) > 0 {
  649. ok := caCertPool.AppendCertsFromPEM(v.store.CABundle)
  650. if !ok {
  651. return nil, errors.New(errVaultCert)
  652. }
  653. }
  654. if v.store.CAProvider != nil && v.storeKind == esv1beta1.ClusterSecretStoreKind && v.store.CAProvider.Namespace == nil {
  655. return nil, errors.New(errCANamespace)
  656. }
  657. if v.store.CAProvider != nil {
  658. var cert []byte
  659. var err error
  660. switch v.store.CAProvider.Type {
  661. case esv1beta1.CAProviderTypeSecret:
  662. cert, err = getCertFromSecret(v)
  663. case esv1beta1.CAProviderTypeConfigMap:
  664. cert, err = getCertFromConfigMap(v)
  665. default:
  666. return nil, errors.New(errUnknownCAProvider)
  667. }
  668. if err != nil {
  669. return nil, err
  670. }
  671. ok := caCertPool.AppendCertsFromPEM(cert)
  672. if !ok {
  673. return nil, errors.New(errVaultCert)
  674. }
  675. }
  676. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  677. transport.TLSClientConfig.RootCAs = caCertPool
  678. }
  679. // If either read-after-write consistency feature is enabled, enable ReadYourWrites
  680. cfg.ReadYourWrites = v.store.ReadYourWrites || v.store.ForwardInconsistent
  681. return cfg, nil
  682. }
  683. func getCertFromSecret(v *client) ([]byte, error) {
  684. secretRef := esmeta.SecretKeySelector{
  685. Name: v.store.CAProvider.Name,
  686. Key: v.store.CAProvider.Key,
  687. }
  688. if v.store.CAProvider.Namespace != nil {
  689. secretRef.Namespace = v.store.CAProvider.Namespace
  690. }
  691. ctx := context.Background()
  692. res, err := v.secretKeyRef(ctx, &secretRef)
  693. if err != nil {
  694. return nil, fmt.Errorf(errVaultCert, err)
  695. }
  696. return []byte(res), nil
  697. }
  698. func getCertFromConfigMap(v *client) ([]byte, error) {
  699. objKey := types.NamespacedName{
  700. Name: v.store.CAProvider.Name,
  701. }
  702. if v.store.CAProvider.Namespace != nil {
  703. objKey.Namespace = *v.store.CAProvider.Namespace
  704. }
  705. configMapRef := &corev1.ConfigMap{}
  706. ctx := context.Background()
  707. err := v.kube.Get(ctx, objKey, configMapRef)
  708. if err != nil {
  709. return nil, fmt.Errorf(errVaultCert, err)
  710. }
  711. val, ok := configMapRef.Data[v.store.CAProvider.Key]
  712. if !ok {
  713. return nil, fmt.Errorf(errConfigMapFmt, v.store.CAProvider.Key)
  714. }
  715. return []byte(val), nil
  716. }
  717. func (v *client) setAuth(ctx context.Context, cfg *vault.Config) error {
  718. tokenExists, err := setSecretKeyToken(ctx, v)
  719. if tokenExists {
  720. return err
  721. }
  722. tokenExists, err = setAppRoleToken(ctx, v)
  723. if tokenExists {
  724. return err
  725. }
  726. tokenExists, err = setKubernetesAuthToken(ctx, v)
  727. if tokenExists {
  728. return err
  729. }
  730. tokenExists, err = setLdapAuthToken(ctx, v)
  731. if tokenExists {
  732. return err
  733. }
  734. tokenExists, err = setJwtAuthToken(ctx, v)
  735. if tokenExists {
  736. return err
  737. }
  738. tokenExists, err = setCertAuthToken(ctx, v, cfg)
  739. if tokenExists {
  740. return err
  741. }
  742. return errors.New(errAuthFormat)
  743. }
  744. func setAppRoleToken(ctx context.Context, v *client) (bool, error) {
  745. tokenRef := v.store.Auth.TokenSecretRef
  746. if tokenRef != nil {
  747. token, err := v.secretKeyRef(ctx, tokenRef)
  748. if err != nil {
  749. return true, err
  750. }
  751. v.client.SetToken(token)
  752. return true, nil
  753. }
  754. return false, nil
  755. }
  756. func setSecretKeyToken(ctx context.Context, v *client) (bool, error) {
  757. appRole := v.store.Auth.AppRole
  758. if appRole != nil {
  759. err := v.requestTokenWithAppRoleRef(ctx, appRole)
  760. if err != nil {
  761. return true, err
  762. }
  763. return true, nil
  764. }
  765. return false, nil
  766. }
  767. func setKubernetesAuthToken(ctx context.Context, v *client) (bool, error) {
  768. kubernetesAuth := v.store.Auth.Kubernetes
  769. if kubernetesAuth != nil {
  770. err := v.requestTokenWithKubernetesAuth(ctx, kubernetesAuth)
  771. if err != nil {
  772. return true, err
  773. }
  774. return true, nil
  775. }
  776. return false, nil
  777. }
  778. func setLdapAuthToken(ctx context.Context, v *client) (bool, error) {
  779. ldapAuth := v.store.Auth.Ldap
  780. if ldapAuth != nil {
  781. err := v.requestTokenWithLdapAuth(ctx, ldapAuth)
  782. if err != nil {
  783. return true, err
  784. }
  785. return true, nil
  786. }
  787. return false, nil
  788. }
  789. func setJwtAuthToken(ctx context.Context, v *client) (bool, error) {
  790. jwtAuth := v.store.Auth.Jwt
  791. if jwtAuth != nil {
  792. err := v.requestTokenWithJwtAuth(ctx, jwtAuth)
  793. if err != nil {
  794. return true, err
  795. }
  796. return true, nil
  797. }
  798. return false, nil
  799. }
  800. func setCertAuthToken(ctx context.Context, v *client, cfg *vault.Config) (bool, error) {
  801. certAuth := v.store.Auth.Cert
  802. if certAuth != nil {
  803. err := v.requestTokenWithCertAuth(ctx, certAuth, cfg)
  804. if err != nil {
  805. return true, err
  806. }
  807. return true, nil
  808. }
  809. return false, nil
  810. }
  811. func (v *client) secretKeyRefForServiceAccount(ctx context.Context, serviceAccountRef *esmeta.ServiceAccountSelector) (string, error) {
  812. serviceAccount := &corev1.ServiceAccount{}
  813. ref := types.NamespacedName{
  814. Namespace: v.namespace,
  815. Name: serviceAccountRef.Name,
  816. }
  817. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  818. (serviceAccountRef.Namespace != nil) {
  819. ref.Namespace = *serviceAccountRef.Namespace
  820. }
  821. err := v.kube.Get(ctx, ref, serviceAccount)
  822. if err != nil {
  823. return "", fmt.Errorf(errGetKubeSA, ref.Name, err)
  824. }
  825. if len(serviceAccount.Secrets) == 0 {
  826. return "", fmt.Errorf(errGetKubeSASecrets, ref.Name)
  827. }
  828. for _, tokenRef := range serviceAccount.Secrets {
  829. retval, err := v.secretKeyRef(ctx, &esmeta.SecretKeySelector{
  830. Name: tokenRef.Name,
  831. Namespace: &ref.Namespace,
  832. Key: "token",
  833. })
  834. if err != nil {
  835. continue
  836. }
  837. return retval, nil
  838. }
  839. return "", fmt.Errorf(errGetKubeSANoToken, ref.Name)
  840. }
  841. func (v *client) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  842. secret := &corev1.Secret{}
  843. ref := types.NamespacedName{
  844. Namespace: v.namespace,
  845. Name: secretRef.Name,
  846. }
  847. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  848. (secretRef.Namespace != nil) {
  849. ref.Namespace = *secretRef.Namespace
  850. }
  851. err := v.kube.Get(ctx, ref, secret)
  852. if err != nil {
  853. return "", fmt.Errorf(errGetKubeSecret, ref.Name, err)
  854. }
  855. keyBytes, ok := secret.Data[secretRef.Key]
  856. if !ok {
  857. return "", fmt.Errorf(errSecretKeyFmt, secretRef.Key)
  858. }
  859. value := string(keyBytes)
  860. valueStr := strings.TrimSpace(value)
  861. return valueStr, nil
  862. }
  863. func (v *client) serviceAccountToken(ctx context.Context, serviceAccountRef esmeta.ServiceAccountSelector, audiences []string, expirationSeconds int64) (string, error) {
  864. tokenRequest := &authenticationv1.TokenRequest{
  865. ObjectMeta: metav1.ObjectMeta{
  866. Namespace: v.namespace,
  867. },
  868. Spec: authenticationv1.TokenRequestSpec{
  869. Audiences: audiences,
  870. ExpirationSeconds: &expirationSeconds,
  871. },
  872. }
  873. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  874. (serviceAccountRef.Namespace != nil) {
  875. tokenRequest.Namespace = *serviceAccountRef.Namespace
  876. }
  877. tokenResponse, err := v.corev1.ServiceAccounts(tokenRequest.Namespace).CreateToken(ctx, serviceAccountRef.Name, tokenRequest, metav1.CreateOptions{})
  878. if err != nil {
  879. return "", fmt.Errorf(errGetKubeSATokenRequest, serviceAccountRef.Name, err)
  880. }
  881. return tokenResponse.Status.Token, nil
  882. }
  883. // checkToken does a lookup and checks if the provided token exists.
  884. func checkToken(ctx context.Context, vStore *client) (bool, error) {
  885. // https://www.vaultproject.io/api-docs/auth/token#lookup-a-token-self
  886. resp, err := vStore.token.LookupSelfWithContext(ctx)
  887. if err != nil {
  888. return false, err
  889. }
  890. t, ok := resp.Data["type"]
  891. if !ok {
  892. return false, fmt.Errorf("could not assert token type")
  893. }
  894. tokenType := t.(string)
  895. if tokenType == "batch" {
  896. return false, nil
  897. }
  898. return true, nil
  899. }
  900. func (v *client) requestTokenWithAppRoleRef(ctx context.Context, appRole *esv1beta1.VaultAppRole) error {
  901. roleID := strings.TrimSpace(appRole.RoleID)
  902. secretID, err := v.secretKeyRef(ctx, &appRole.SecretRef)
  903. if err != nil {
  904. return err
  905. }
  906. secret := approle.SecretID{FromString: secretID}
  907. appRoleClient, err := approle.NewAppRoleAuth(roleID, &secret, approle.WithMountPath(appRole.Path))
  908. if err != nil {
  909. return err
  910. }
  911. _, err = v.auth.Login(ctx, appRoleClient)
  912. if err != nil {
  913. return err
  914. }
  915. return nil
  916. }
  917. func (v *client) requestTokenWithKubernetesAuth(ctx context.Context, kubernetesAuth *esv1beta1.VaultKubernetesAuth) error {
  918. jwtString, err := getJwtString(ctx, v, kubernetesAuth)
  919. if err != nil {
  920. return err
  921. }
  922. k, err := authkubernetes.NewKubernetesAuth(kubernetesAuth.Role, authkubernetes.WithServiceAccountToken(jwtString), authkubernetes.WithMountPath(kubernetesAuth.Path))
  923. if err != nil {
  924. return err
  925. }
  926. _, err = v.auth.Login(ctx, k)
  927. if err != nil {
  928. return err
  929. }
  930. return nil
  931. }
  932. func getJwtString(ctx context.Context, v *client, kubernetesAuth *esv1beta1.VaultKubernetesAuth) (string, error) {
  933. if kubernetesAuth.ServiceAccountRef != nil {
  934. jwt, err := v.secretKeyRefForServiceAccount(ctx, kubernetesAuth.ServiceAccountRef)
  935. if err != nil {
  936. return "", err
  937. }
  938. return jwt, nil
  939. } else if kubernetesAuth.SecretRef != nil {
  940. tokenRef := kubernetesAuth.SecretRef
  941. if tokenRef.Key == "" {
  942. tokenRef = kubernetesAuth.SecretRef.DeepCopy()
  943. tokenRef.Key = "token"
  944. }
  945. jwt, err := v.secretKeyRef(ctx, tokenRef)
  946. if err != nil {
  947. return "", err
  948. }
  949. return jwt, nil
  950. } else {
  951. // Kubernetes authentication is specified, but without a referenced
  952. // Kubernetes secret. We check if the file path for in-cluster service account
  953. // exists and attempt to use the token for Vault Kubernetes auth.
  954. if _, err := os.Stat(serviceAccTokenPath); err != nil {
  955. return "", fmt.Errorf(errServiceAccount, err)
  956. }
  957. jwtByte, err := os.ReadFile(serviceAccTokenPath)
  958. if err != nil {
  959. return "", fmt.Errorf(errServiceAccount, err)
  960. }
  961. return string(jwtByte), nil
  962. }
  963. }
  964. func (v *client) requestTokenWithLdapAuth(ctx context.Context, ldapAuth *esv1beta1.VaultLdapAuth) error {
  965. username := strings.TrimSpace(ldapAuth.Username)
  966. password, err := v.secretKeyRef(ctx, &ldapAuth.SecretRef)
  967. if err != nil {
  968. return err
  969. }
  970. pass := authldap.Password{FromString: password}
  971. l, err := authldap.NewLDAPAuth(username, &pass, authldap.WithMountPath(ldapAuth.Path))
  972. if err != nil {
  973. return err
  974. }
  975. _, err = v.auth.Login(ctx, l)
  976. if err != nil {
  977. return err
  978. }
  979. return nil
  980. }
  981. func (v *client) requestTokenWithJwtAuth(ctx context.Context, jwtAuth *esv1beta1.VaultJwtAuth) error {
  982. role := strings.TrimSpace(jwtAuth.Role)
  983. var jwt string
  984. var err error
  985. if jwtAuth.SecretRef != nil {
  986. jwt, err = v.secretKeyRef(ctx, jwtAuth.SecretRef)
  987. } else if k8sServiceAccountToken := jwtAuth.KubernetesServiceAccountToken; k8sServiceAccountToken != nil {
  988. audiences := k8sServiceAccountToken.Audiences
  989. if audiences == nil {
  990. audiences = &[]string{"vault"}
  991. }
  992. expirationSeconds := k8sServiceAccountToken.ExpirationSeconds
  993. if expirationSeconds == nil {
  994. tmp := int64(600)
  995. expirationSeconds = &tmp
  996. }
  997. jwt, err = v.serviceAccountToken(ctx, k8sServiceAccountToken.ServiceAccountRef, *audiences, *expirationSeconds)
  998. } else {
  999. err = fmt.Errorf(errJwtNoTokenSource)
  1000. }
  1001. if err != nil {
  1002. return err
  1003. }
  1004. parameters := map[string]interface{}{
  1005. "role": role,
  1006. "jwt": jwt,
  1007. }
  1008. url := strings.Join([]string{"auth", jwtAuth.Path, "login"}, "/")
  1009. vaultResult, err := v.logical.WriteWithContext(ctx, url, parameters)
  1010. if err != nil {
  1011. return err
  1012. }
  1013. token, err := vaultResult.TokenID()
  1014. if err != nil {
  1015. return fmt.Errorf(errVaultToken, err)
  1016. }
  1017. v.client.SetToken(token)
  1018. return nil
  1019. }
  1020. func (v *client) requestTokenWithCertAuth(ctx context.Context, certAuth *esv1beta1.VaultCertAuth, cfg *vault.Config) error {
  1021. clientKey, err := v.secretKeyRef(ctx, &certAuth.SecretRef)
  1022. if err != nil {
  1023. return err
  1024. }
  1025. clientCert, err := v.secretKeyRef(ctx, &certAuth.ClientCert)
  1026. if err != nil {
  1027. return err
  1028. }
  1029. cert, err := tls.X509KeyPair([]byte(clientCert), []byte(clientKey))
  1030. if err != nil {
  1031. return fmt.Errorf(errClientTLSAuth, err)
  1032. }
  1033. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  1034. transport.TLSClientConfig.Certificates = []tls.Certificate{cert}
  1035. }
  1036. url := strings.Join([]string{"auth", "cert", "login"}, "/")
  1037. vaultResult, err := v.logical.WriteWithContext(ctx, url, nil)
  1038. if err != nil {
  1039. return fmt.Errorf(errVaultRequest, err)
  1040. }
  1041. token, err := vaultResult.TokenID()
  1042. if err != nil {
  1043. return fmt.Errorf(errVaultToken, err)
  1044. }
  1045. v.client.SetToken(token)
  1046. return nil
  1047. }