provider.go 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "time"
  18. vault "github.com/hashicorp/vault/api"
  19. "github.com/spf13/pflag"
  20. "k8s.io/client-go/kubernetes"
  21. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  22. ctrl "sigs.k8s.io/controller-runtime"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  25. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  26. "github.com/external-secrets/external-secrets/pkg/cache"
  27. "github.com/external-secrets/external-secrets/pkg/feature"
  28. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  29. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  30. )
  31. var (
  32. _ esv1.Provider = &Provider{}
  33. enableCache bool
  34. logger = ctrl.Log.WithName("provider").WithName("vault")
  35. clientCache *cache.Cache[util.Client]
  36. )
  37. const (
  38. errVaultStore = "received invalid Vault SecretStore resource: %w"
  39. errVaultClient = "cannot setup new vault client: %w"
  40. errVaultCert = "cannot set Vault CA certificate: %w"
  41. errClientTLSAuth = "error from Client TLS Auth: %q"
  42. errCANamespace = "missing namespace on caProvider secret"
  43. )
  44. type Provider struct {
  45. // NewVaultClient is a function that returns a new Vault client.
  46. // This is used for testing to inject a fake client.
  47. NewVaultClient func(config *vault.Config) (util.Client, error)
  48. }
  49. // NewVaultClient returns a new Vault client.
  50. func NewVaultClient(config *vault.Config) (util.Client, error) {
  51. vaultClient, err := vault.NewClient(config)
  52. if err != nil {
  53. return nil, err
  54. }
  55. return &util.VaultClient{
  56. SetTokenFunc: vaultClient.SetToken,
  57. TokenFunc: vaultClient.Token,
  58. ClearTokenFunc: vaultClient.ClearToken,
  59. AuthField: vaultClient.Auth(),
  60. AuthTokenField: vaultClient.Auth().Token(),
  61. LogicalField: vaultClient.Logical(),
  62. NamespaceFunc: vaultClient.Namespace,
  63. SetNamespaceFunc: vaultClient.SetNamespace,
  64. AddHeaderFunc: vaultClient.AddHeader,
  65. }, nil
  66. }
  67. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  68. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  69. return esv1.SecretStoreReadWrite
  70. }
  71. // NewClient implements the Client interface.
  72. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  73. // controller-runtime/client does not support TokenRequest or other subresource APIs
  74. // so we need to construct our own client and use it to fetch tokens
  75. // (for Kubernetes service account token auth)
  76. restCfg, err := ctrlcfg.GetConfig()
  77. if err != nil {
  78. return nil, err
  79. }
  80. clientset, err := kubernetes.NewForConfig(restCfg)
  81. if err != nil {
  82. return nil, err
  83. }
  84. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  85. }
  86. func (p *Provider) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, namespace string, retrySettings *esv1.SecretStoreRetrySettings) (util.Client, error) {
  87. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, retrySettings, namespace, resolvers.EmptyStoreKind)
  88. if err != nil {
  89. return nil, err
  90. }
  91. client, err := p.NewVaultClient(cfg)
  92. if err != nil {
  93. return nil, err
  94. }
  95. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  96. if err != nil {
  97. return nil, err
  98. }
  99. return client, nil
  100. }
  101. func (p *Provider) newClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  102. storeSpec := store.GetSpec()
  103. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  104. return nil, errors.New(errVaultStore)
  105. }
  106. vaultSpec := storeSpec.Provider.Vault
  107. vStore, cfg, err := p.prepareConfig(
  108. ctx,
  109. kube,
  110. corev1,
  111. vaultSpec,
  112. storeSpec.RetrySettings,
  113. namespace,
  114. store.GetObjectKind().GroupVersionKind().Kind)
  115. if err != nil {
  116. return nil, err
  117. }
  118. client, err := getVaultClient(p, store, cfg)
  119. if err != nil {
  120. return nil, fmt.Errorf(errVaultClient, err)
  121. }
  122. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  123. }
  124. func (p *Provider) initClient(ctx context.Context, c *client, client util.Client, cfg *vault.Config, vaultSpec *esv1.VaultProvider) (esv1.SecretsClient, error) {
  125. if vaultSpec.Namespace != nil {
  126. client.SetNamespace(*vaultSpec.Namespace)
  127. }
  128. if vaultSpec.Headers != nil {
  129. for hKey, hValue := range vaultSpec.Headers {
  130. client.AddHeader(hKey, hValue)
  131. }
  132. }
  133. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  134. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  135. }
  136. c.client = client
  137. c.auth = client.Auth()
  138. c.logical = client.Logical()
  139. c.token = client.AuthToken()
  140. // allow SecretStore controller validation to pass
  141. // when using referent namespace.
  142. if c.storeKind == esv1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  143. return c, nil
  144. }
  145. if err := c.setAuth(ctx, cfg); err != nil {
  146. return nil, err
  147. }
  148. return c, nil
  149. }
  150. func (p *Provider) prepareConfig(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, retrySettings *esv1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  151. c := &client{
  152. kube: kube,
  153. corev1: corev1,
  154. store: vaultSpec,
  155. log: logger,
  156. namespace: namespace,
  157. storeKind: storeKind,
  158. }
  159. cfg, err := c.newConfig(ctx)
  160. if err != nil {
  161. return nil, nil, err
  162. }
  163. // Setup retry options if present
  164. if retrySettings != nil {
  165. if retrySettings.MaxRetries != nil {
  166. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  167. } else {
  168. // By default we rely only on the reconciliation process for retrying
  169. cfg.MaxRetries = 0
  170. }
  171. if retrySettings.RetryInterval != nil {
  172. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  173. if err != nil {
  174. return nil, nil, err
  175. }
  176. cfg.MinRetryWait = retryWait
  177. cfg.MaxRetryWait = retryWait
  178. }
  179. }
  180. return c, cfg, nil
  181. }
  182. func getVaultClient(p *Provider, store esv1.GenericStore, cfg *vault.Config) (util.Client, error) {
  183. auth := store.GetSpec().Provider.Vault.Auth
  184. isStaticToken := auth != nil && auth.TokenSecretRef != nil
  185. useCache := enableCache && !isStaticToken
  186. key := cache.Key{
  187. Name: store.GetObjectMeta().Name,
  188. Namespace: store.GetObjectMeta().Namespace,
  189. Kind: store.GetTypeMeta().Kind,
  190. }
  191. if useCache {
  192. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  193. if ok {
  194. return client, nil
  195. }
  196. }
  197. client, err := p.NewVaultClient(cfg)
  198. if err != nil {
  199. return nil, fmt.Errorf(errVaultClient, err)
  200. }
  201. if useCache && !clientCache.Contains(key) {
  202. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  203. }
  204. return client, nil
  205. }
  206. func isReferentSpec(prov *esv1.VaultProvider) bool {
  207. if prov.Auth == nil {
  208. return false
  209. }
  210. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  211. return true
  212. }
  213. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  214. return true
  215. }
  216. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  217. return true
  218. }
  219. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  220. return true
  221. }
  222. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  223. return true
  224. }
  225. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  226. return true
  227. }
  228. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  229. return true
  230. }
  231. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  232. return true
  233. }
  234. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  235. return true
  236. }
  237. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  238. return true
  239. }
  240. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  241. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  242. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  243. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  244. return true
  245. }
  246. return false
  247. }
  248. func init() {
  249. var vaultTokenCacheSize int
  250. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  251. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  252. // max. 265k vault leases with 30bytes each ~= 7MB
  253. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", 2<<17, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  254. lateInit := func() {
  255. logger.Info("initializing vault cache", "size", vaultTokenCacheSize)
  256. clientCache = cache.Must(vaultTokenCacheSize, func(client util.Client) {
  257. err := revokeTokenIfValid(context.Background(), client)
  258. if err != nil {
  259. logger.Error(err, "unable to revoke cached token on eviction")
  260. }
  261. })
  262. }
  263. feature.Register(feature.Feature{
  264. Flags: fs,
  265. Initialize: lateInit,
  266. })
  267. esv1.Register(&Provider{
  268. NewVaultClient: NewVaultClient,
  269. }, &esv1.SecretStoreProvider{
  270. Vault: &esv1.VaultProvider{},
  271. }, esv1.MaintenanceStatusMaintained)
  272. }