provider.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "time"
  18. vault "github.com/hashicorp/vault/api"
  19. "github.com/spf13/pflag"
  20. "k8s.io/client-go/kubernetes"
  21. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  22. ctrl "sigs.k8s.io/controller-runtime"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  25. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  26. "github.com/external-secrets/external-secrets/pkg/cache"
  27. "github.com/external-secrets/external-secrets/pkg/feature"
  28. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  29. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  30. )
  31. var (
  32. _ esv1.Provider = &Provider{}
  33. enableCache bool
  34. logger = ctrl.Log.WithName("provider").WithName("vault")
  35. clientCache *cache.Cache[util.Client]
  36. )
  37. const (
  38. errVaultStore = "received invalid Vault SecretStore resource: %w"
  39. errVaultClient = "cannot setup new vault client: %w"
  40. errVaultCert = "cannot set Vault CA certificate: %w"
  41. errClientTLSAuth = "error from Client TLS Auth: %q"
  42. errCANamespace = "missing namespace on caProvider secret"
  43. )
  44. const (
  45. defaultCacheSize = 2 << 17
  46. )
  47. type Provider struct {
  48. // NewVaultClient is a function that returns a new Vault client.
  49. // This is used for testing to inject a fake client.
  50. NewVaultClient func(config *vault.Config) (util.Client, error)
  51. }
  52. // NewVaultClient returns a new Vault client.
  53. func NewVaultClient(config *vault.Config) (util.Client, error) {
  54. vaultClient, err := vault.NewClient(config)
  55. if err != nil {
  56. return nil, err
  57. }
  58. return &util.VaultClient{
  59. SetTokenFunc: vaultClient.SetToken,
  60. TokenFunc: vaultClient.Token,
  61. ClearTokenFunc: vaultClient.ClearToken,
  62. AuthField: vaultClient.Auth(),
  63. AuthTokenField: vaultClient.Auth().Token(),
  64. LogicalField: vaultClient.Logical(),
  65. NamespaceFunc: vaultClient.Namespace,
  66. SetNamespaceFunc: vaultClient.SetNamespace,
  67. AddHeaderFunc: vaultClient.AddHeader,
  68. }, nil
  69. }
  70. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  71. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  72. return esv1.SecretStoreReadWrite
  73. }
  74. // NewClient implements the Client interface.
  75. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  76. // controller-runtime/client does not support TokenRequest or other subresource APIs
  77. // so we need to construct our own client and use it to fetch tokens
  78. // (for Kubernetes service account token auth)
  79. restCfg, err := ctrlcfg.GetConfig()
  80. if err != nil {
  81. return nil, err
  82. }
  83. clientset, err := kubernetes.NewForConfig(restCfg)
  84. if err != nil {
  85. return nil, err
  86. }
  87. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  88. }
  89. func (p *Provider) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, namespace string, retrySettings *esv1.SecretStoreRetrySettings) (util.Client, error) {
  90. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, retrySettings, namespace, resolvers.EmptyStoreKind)
  91. if err != nil {
  92. return nil, err
  93. }
  94. client, err := p.NewVaultClient(cfg)
  95. if err != nil {
  96. return nil, err
  97. }
  98. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  99. if err != nil {
  100. return nil, err
  101. }
  102. return client, nil
  103. }
  104. func (p *Provider) newClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  105. storeSpec := store.GetSpec()
  106. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  107. return nil, errors.New(errVaultStore)
  108. }
  109. vaultSpec := storeSpec.Provider.Vault
  110. vStore, cfg, err := p.prepareConfig(
  111. ctx,
  112. kube,
  113. corev1,
  114. vaultSpec,
  115. storeSpec.RetrySettings,
  116. namespace,
  117. store.GetObjectKind().GroupVersionKind().Kind)
  118. if err != nil {
  119. return nil, err
  120. }
  121. client, err := getVaultClient(p, store, cfg, namespace)
  122. if err != nil {
  123. return nil, fmt.Errorf(errVaultClient, err)
  124. }
  125. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  126. }
  127. func (p *Provider) initClient(ctx context.Context, c *client, client util.Client, cfg *vault.Config, vaultSpec *esv1.VaultProvider) (esv1.SecretsClient, error) {
  128. if vaultSpec.Namespace != nil {
  129. client.SetNamespace(*vaultSpec.Namespace)
  130. }
  131. if vaultSpec.Headers != nil {
  132. for hKey, hValue := range vaultSpec.Headers {
  133. client.AddHeader(hKey, hValue)
  134. }
  135. }
  136. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  137. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  138. }
  139. c.client = client
  140. c.auth = client.Auth()
  141. c.logical = client.Logical()
  142. c.token = client.AuthToken()
  143. // allow SecretStore controller validation to pass
  144. // when using referent namespace.
  145. if c.storeKind == esv1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  146. return c, nil
  147. }
  148. if err := c.setAuth(ctx, cfg); err != nil {
  149. return nil, err
  150. }
  151. return c, nil
  152. }
  153. func (p *Provider) prepareConfig(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, retrySettings *esv1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  154. c := &client{
  155. kube: kube,
  156. corev1: corev1,
  157. store: vaultSpec,
  158. log: logger,
  159. namespace: namespace,
  160. storeKind: storeKind,
  161. }
  162. cfg, err := c.newConfig(ctx)
  163. if err != nil {
  164. return nil, nil, err
  165. }
  166. // Setup retry options if present
  167. if retrySettings != nil {
  168. if retrySettings.MaxRetries != nil {
  169. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  170. } else {
  171. // By default we rely only on the reconciliation process for retrying
  172. cfg.MaxRetries = 0
  173. }
  174. if retrySettings.RetryInterval != nil {
  175. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  176. if err != nil {
  177. return nil, nil, err
  178. }
  179. cfg.MinRetryWait = retryWait
  180. cfg.MaxRetryWait = retryWait
  181. }
  182. }
  183. return c, cfg, nil
  184. }
  185. func getVaultClient(p *Provider, store esv1.GenericStore, cfg *vault.Config, namespace string) (util.Client, error) {
  186. vaultProvider := store.GetSpec().Provider.Vault
  187. auth := vaultProvider.Auth
  188. isStaticToken := auth != nil && auth.TokenSecretRef != nil
  189. useCache := enableCache && !isStaticToken
  190. keyNamespace := store.GetObjectMeta().Namespace
  191. // A single ClusterSecretStore may need to spawn separate vault clients for each namespace.
  192. if store.GetTypeMeta().Kind == esv1.ClusterSecretStoreKind && namespace != "" && isReferentSpec(vaultProvider) {
  193. keyNamespace = namespace
  194. }
  195. key := cache.Key{
  196. Name: store.GetObjectMeta().Name,
  197. Namespace: keyNamespace,
  198. Kind: store.GetTypeMeta().Kind,
  199. }
  200. if useCache {
  201. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  202. if ok {
  203. return client, nil
  204. }
  205. }
  206. client, err := p.NewVaultClient(cfg)
  207. if err != nil {
  208. return nil, fmt.Errorf(errVaultClient, err)
  209. }
  210. if useCache && !clientCache.Contains(key) {
  211. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  212. }
  213. return client, nil
  214. }
  215. func isReferentSpec(prov *esv1.VaultProvider) bool {
  216. if prov.Auth == nil {
  217. return false
  218. }
  219. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  220. return true
  221. }
  222. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  223. return true
  224. }
  225. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  226. return true
  227. }
  228. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  229. return true
  230. }
  231. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  232. return true
  233. }
  234. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  235. return true
  236. }
  237. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  238. return true
  239. }
  240. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  241. return true
  242. }
  243. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  244. return true
  245. }
  246. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  247. return true
  248. }
  249. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  250. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  251. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  252. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  253. return true
  254. }
  255. return false
  256. }
  257. func initCache(size int) {
  258. logger.Info("initializing vault cache", "size", size)
  259. clientCache = cache.Must(size, func(client util.Client) {
  260. err := revokeTokenIfValid(context.Background(), client)
  261. if err != nil {
  262. logger.Error(err, "unable to revoke cached token on eviction")
  263. }
  264. })
  265. }
  266. func init() {
  267. var vaultTokenCacheSize int
  268. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  269. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  270. // max. 265k vault leases with 30bytes each ~= 7MB
  271. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", defaultCacheSize, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  272. feature.Register(feature.Feature{
  273. Flags: fs,
  274. Initialize: func() { initCache(vaultTokenCacheSize) },
  275. })
  276. esv1.Register(&Provider{
  277. NewVaultClient: NewVaultClient,
  278. }, &esv1.SecretStoreProvider{
  279. Vault: &esv1.VaultProvider{},
  280. }, esv1.MaintenanceStatusMaintained)
  281. }