akeyless.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "net/url"
  22. "strconv"
  23. "strings"
  24. "time"
  25. "github.com/akeylesslabs/akeyless-go/v3"
  26. "github.com/tidwall/gjson"
  27. corev1 "k8s.io/api/core/v1"
  28. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  29. "k8s.io/client-go/kubernetes"
  30. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  31. "sigs.k8s.io/controller-runtime/pkg/client"
  32. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  33. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  34. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  35. "github.com/external-secrets/external-secrets/pkg/find"
  36. "github.com/external-secrets/external-secrets/pkg/utils"
  37. )
  38. const (
  39. defaultAPIUrl = "https://api.akeyless.io"
  40. )
  41. // https://github.com/external-secrets/external-secrets/issues/644
  42. var _ esv1beta1.SecretsClient = &Akeyless{}
  43. var _ esv1beta1.Provider = &Provider{}
  44. // Provider satisfies the provider interface.
  45. type Provider struct{}
  46. // akeylessBase satisfies the provider.SecretsClient interface.
  47. type akeylessBase struct {
  48. kube client.Client
  49. store esv1beta1.GenericStore
  50. storeKind string
  51. corev1 typedcorev1.CoreV1Interface
  52. namespace string
  53. akeylessGwAPIURL string
  54. RestAPI *akeyless.V2ApiService
  55. }
  56. type Akeyless struct {
  57. Client akeylessVaultInterface
  58. url string
  59. }
  60. type akeylessVaultInterface interface {
  61. GetSecretByType(ctx context.Context, secretName, token string, version int32) (string, error)
  62. TokenFromSecretRef(ctx context.Context) (string, error)
  63. ListSecrets(ctx context.Context, path, tag, token string) ([]string, error)
  64. }
  65. func init() {
  66. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  67. Akeyless: &esv1beta1.AkeylessProvider{},
  68. })
  69. }
  70. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  71. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  72. return esv1beta1.SecretStoreReadOnly
  73. }
  74. // NewClient constructs a new secrets client based on the provided store.
  75. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  76. // controller-runtime/client does not support TokenRequest or other subresource APIs
  77. // so we need to construct our own client and use it to fetch tokens
  78. // (for Kubernetes service account token auth)
  79. restCfg, err := ctrlcfg.GetConfig()
  80. if err != nil {
  81. return nil, err
  82. }
  83. clientset, err := kubernetes.NewForConfig(restCfg)
  84. if err != nil {
  85. return nil, err
  86. }
  87. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  88. }
  89. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  90. storeSpec := store.GetSpec()
  91. akeylessSpec := storeSpec.Provider.Akeyless
  92. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  93. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  94. url, err := url.Parse(*akeylessGWApiURL)
  95. if err != nil {
  96. return fmt.Errorf(errInvalidAkeylessURL)
  97. }
  98. if url.Host == "" {
  99. return fmt.Errorf(errInvalidAkeylessURL)
  100. }
  101. }
  102. if akeylessSpec.Auth.KubernetesAuth != nil {
  103. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  104. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  105. return fmt.Errorf(errInvalidKubeSA, err)
  106. }
  107. }
  108. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  109. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  110. if err != nil {
  111. return err
  112. }
  113. }
  114. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  115. return fmt.Errorf("missing kubernetes auth-method access-id")
  116. }
  117. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  118. return fmt.Errorf("missing kubernetes config name")
  119. }
  120. return nil
  121. }
  122. accessID := akeylessSpec.Auth.SecretRef.AccessID
  123. err := utils.ValidateSecretSelector(store, accessID)
  124. if err != nil {
  125. return err
  126. }
  127. if accessID.Name == "" {
  128. return fmt.Errorf(errInvalidAkeylessAccessIDName)
  129. }
  130. if accessID.Key == "" {
  131. return fmt.Errorf(errInvalidAkeylessAccessIDKey)
  132. }
  133. accessType := akeylessSpec.Auth.SecretRef.AccessType
  134. err = utils.ValidateSecretSelector(store, accessType)
  135. if err != nil {
  136. return err
  137. }
  138. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  139. err = utils.ValidateSecretSelector(store, accessTypeParam)
  140. if err != nil {
  141. return err
  142. }
  143. return nil
  144. }
  145. func newClient(_ context.Context, store esv1beta1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  146. akl := &akeylessBase{
  147. kube: kube,
  148. store: store,
  149. namespace: namespace,
  150. corev1: corev1,
  151. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  152. }
  153. spec, err := GetAKeylessProvider(store)
  154. if err != nil {
  155. return nil, err
  156. }
  157. akeylessGwAPIURL := defaultAPIUrl
  158. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  159. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  160. }
  161. if spec.Auth == nil {
  162. return nil, fmt.Errorf("missing Auth in store config")
  163. }
  164. client, err := akl.getAkeylessHTTPClient(spec)
  165. if err != nil {
  166. return nil, err
  167. }
  168. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  169. HTTPClient: client,
  170. Servers: []akeyless.ServerConfiguration{
  171. {
  172. URL: akeylessGwAPIURL,
  173. },
  174. },
  175. }).V2Api
  176. akl.akeylessGwAPIURL = akeylessGwAPIURL
  177. akl.RestAPI = RestAPIClient
  178. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  179. }
  180. func (a *Akeyless) Close(_ context.Context) error {
  181. return nil
  182. }
  183. func (a *Akeyless) Validate() (esv1beta1.ValidationResult, error) {
  184. timeout := 15 * time.Second
  185. url := a.url
  186. if err := utils.NetworkValidate(url, timeout); err != nil {
  187. return esv1beta1.ValidationResultError, err
  188. }
  189. return esv1beta1.ValidationResultReady, nil
  190. }
  191. func (a *Akeyless) PushSecret(_ context.Context, _ []byte, _ *apiextensionsv1.JSON, _ esv1beta1.PushRemoteRef) error {
  192. return fmt.Errorf("not implemented")
  193. }
  194. func (a *Akeyless) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
  195. return fmt.Errorf("not implemented")
  196. }
  197. // Implements store.Client.GetSecret Interface.
  198. // Retrieves a secret with the secret name defined in ref.Name.
  199. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  200. if utils.IsNil(a.Client) {
  201. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  202. }
  203. token, err := a.Client.TokenFromSecretRef(ctx)
  204. if err != nil {
  205. return nil, err
  206. }
  207. version := int32(0)
  208. if ref.Version != "" {
  209. i, err := strconv.ParseInt(ref.Version, 10, 32)
  210. if err == nil {
  211. version = int32(i)
  212. }
  213. }
  214. value, err := a.Client.GetSecretByType(ctx, ref.Key, token, version)
  215. if err != nil {
  216. return nil, err
  217. }
  218. if ref.Property == "" {
  219. if value != "" {
  220. return []byte(value), nil
  221. }
  222. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  223. }
  224. // We need to search if a given key with a . exists before using gjson operations.
  225. idx := strings.Index(ref.Property, ".")
  226. if idx > -1 {
  227. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  228. val := gjson.Get(value, refProperty)
  229. if val.Exists() {
  230. return []byte(val.String()), nil
  231. }
  232. }
  233. val := gjson.Get(value, ref.Property)
  234. if !val.Exists() {
  235. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  236. }
  237. return []byte(val.String()), nil
  238. }
  239. // Implements store.Client.GetAllSecrets Interface.
  240. // Retrieves a all secrets with defined in ref.Name or tags.
  241. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  242. if utils.IsNil(a.Client) {
  243. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  244. }
  245. searchPath := ""
  246. if ref.Path != nil {
  247. searchPath = *ref.Path
  248. if !strings.HasPrefix(searchPath, "/") {
  249. searchPath = "/" + searchPath
  250. }
  251. if !strings.HasSuffix(searchPath, "/") {
  252. searchPath += "/"
  253. }
  254. }
  255. token, err := a.Client.TokenFromSecretRef(ctx)
  256. if err != nil {
  257. return nil, err
  258. }
  259. if ref.Name != nil {
  260. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "", token)
  261. if err != nil {
  262. return nil, err
  263. }
  264. if len(potentialSecrets) == 0 {
  265. return nil, nil
  266. }
  267. return a.findSecretsFromName(ctx, potentialSecrets, *ref.Name, token)
  268. }
  269. if len(ref.Tags) > 0 {
  270. var potentialSecretsName []string
  271. for _, v := range ref.Tags {
  272. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v, token)
  273. if err != nil {
  274. return nil, err
  275. }
  276. if len(potentialSecrets) > 0 {
  277. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  278. }
  279. }
  280. if len(potentialSecretsName) == 0 {
  281. return nil, nil
  282. }
  283. return a.getSecrets(ctx, potentialSecretsName, token)
  284. }
  285. return nil, errors.New("unexpected find operator")
  286. }
  287. func (a *Akeyless) getSecrets(ctx context.Context, candidates []string, token string) (map[string][]byte, error) {
  288. secrets := make(map[string][]byte)
  289. for _, name := range candidates {
  290. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  291. if err != nil {
  292. return nil, err
  293. }
  294. if secretValue != "" {
  295. secrets[name] = []byte(secretValue)
  296. }
  297. }
  298. return secrets, nil
  299. }
  300. func (a *Akeyless) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName, token string) (map[string][]byte, error) {
  301. secrets := make(map[string][]byte)
  302. matcher, err := find.New(ref)
  303. if err != nil {
  304. return nil, err
  305. }
  306. for _, name := range candidates {
  307. ok := matcher.MatchName(name)
  308. if ok {
  309. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  310. if err != nil {
  311. return nil, err
  312. }
  313. if secretValue != "" {
  314. secrets[name] = []byte(secretValue)
  315. }
  316. }
  317. }
  318. return secrets, nil
  319. }
  320. // Implements store.Client.GetSecretMap Interface.
  321. // New version of GetSecretMap.
  322. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  323. if utils.IsNil(a.Client) {
  324. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  325. }
  326. val, err := a.GetSecret(ctx, ref)
  327. if err != nil {
  328. return nil, err
  329. }
  330. // Maps the json data to a string:string map
  331. kv := make(map[string]string)
  332. err = json.Unmarshal(val, &kv)
  333. if err != nil {
  334. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  335. }
  336. // Converts values in K:V pairs into bytes, while leaving keys as strings
  337. secretData := make(map[string][]byte)
  338. for k, v := range kv {
  339. secretData[k] = []byte(v)
  340. }
  341. return secretData, nil
  342. }
  343. func (a *akeylessBase) getAkeylessHTTPClient(provider *esv1beta1.AkeylessProvider) (*http.Client, error) {
  344. client := &http.Client{Timeout: 30 * time.Second}
  345. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  346. return client, nil
  347. }
  348. caCertPool, err := a.getCACertPool(provider)
  349. if err != nil {
  350. return nil, err
  351. }
  352. tlsConf := &tls.Config{
  353. RootCAs: caCertPool,
  354. MinVersion: tls.VersionTLS12,
  355. }
  356. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  357. return client, nil
  358. }
  359. func (a *akeylessBase) getCACertPool(provider *esv1beta1.AkeylessProvider) (*x509.CertPool, error) {
  360. caCertPool := x509.NewCertPool()
  361. if len(provider.CABundle) > 0 {
  362. pem, err := base64decode(provider.CABundle)
  363. if err != nil {
  364. pem = provider.CABundle
  365. }
  366. ok := caCertPool.AppendCertsFromPEM(pem)
  367. if !ok {
  368. return nil, fmt.Errorf("failed to append cabundle")
  369. }
  370. }
  371. if provider.CAProvider != nil && a.storeKind == esv1beta1.ClusterSecretStoreKind && provider.CAProvider.Namespace == nil {
  372. return nil, fmt.Errorf("missing namespace on CAProvider secret")
  373. }
  374. if provider.CAProvider != nil {
  375. var cert []byte
  376. var err error
  377. switch provider.CAProvider.Type {
  378. case esv1beta1.CAProviderTypeSecret:
  379. cert, err = a.getCertFromSecret(provider)
  380. case esv1beta1.CAProviderTypeConfigMap:
  381. cert, err = a.getCertFromConfigMap(provider)
  382. default:
  383. err = fmt.Errorf("unknown caprovider type: %s", provider.CAProvider.Type)
  384. }
  385. if err != nil {
  386. return nil, err
  387. }
  388. pem, err := base64decode(cert)
  389. if err != nil {
  390. pem = cert
  391. }
  392. ok := caCertPool.AppendCertsFromPEM(pem)
  393. if !ok {
  394. return nil, fmt.Errorf("failed to append cabundle")
  395. }
  396. }
  397. return caCertPool, nil
  398. }
  399. func (a *akeylessBase) getCertFromSecret(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  400. secretRef := esmeta.SecretKeySelector{
  401. Name: provider.CAProvider.Name,
  402. Key: provider.CAProvider.Key,
  403. }
  404. if provider.CAProvider.Namespace != nil {
  405. secretRef.Namespace = provider.CAProvider.Namespace
  406. }
  407. ctx := context.Background()
  408. res, err := a.secretKeyRef(ctx, &secretRef)
  409. if err != nil {
  410. return nil, err
  411. }
  412. return []byte(res), nil
  413. }
  414. func (a *akeylessBase) getCertFromConfigMap(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  415. objKey := client.ObjectKey{
  416. Name: provider.CAProvider.Name,
  417. }
  418. if provider.CAProvider.Namespace != nil {
  419. objKey.Namespace = *provider.CAProvider.Namespace
  420. }
  421. configMapRef := &corev1.ConfigMap{}
  422. ctx := context.Background()
  423. err := a.kube.Get(ctx, objKey, configMapRef)
  424. if err != nil {
  425. return nil, fmt.Errorf("failed to get caprovider secret %s: %w", objKey.Name, err)
  426. }
  427. val, ok := configMapRef.Data[provider.CAProvider.Key]
  428. if !ok {
  429. return nil, fmt.Errorf("failed to get caprovider configmap %s -> %s", objKey.Name, provider.CAProvider.Key)
  430. }
  431. return []byte(val), nil
  432. }