vault.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "errors"
  18. "fmt"
  19. "io/ioutil"
  20. "net/http"
  21. "os"
  22. "strings"
  23. "github.com/go-logr/logr"
  24. vault "github.com/hashicorp/vault/api"
  25. corev1 "k8s.io/api/core/v1"
  26. "k8s.io/apimachinery/pkg/types"
  27. ctrl "sigs.k8s.io/controller-runtime"
  28. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  29. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  30. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  31. "github.com/external-secrets/external-secrets/pkg/provider"
  32. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  33. )
  34. var (
  35. _ provider.Provider = &connector{}
  36. _ provider.SecretsClient = &client{}
  37. )
  38. const (
  39. serviceAccTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/token"
  40. errVaultStore = "received invalid Vault SecretStore resource: %w"
  41. errVaultClient = "cannot setup new vault client: %w"
  42. errVaultCert = "cannot set Vault CA certificate: %w"
  43. errReadSecret = "cannot read secret data from Vault: %w"
  44. errAuthFormat = "cannot initialize Vault client: no valid auth method specified: %w"
  45. errDataField = "failed to find data field"
  46. errJSONUnmarshall = "failed to unmarshall JSON"
  47. errSecretFormat = "secret data not in expected format"
  48. errVaultToken = "cannot parse Vault authentication token: %w"
  49. errVaultReqParams = "cannot set Vault request parameters: %w"
  50. errVaultRequest = "error from Vault request: %w"
  51. errVaultResponse = "cannot parse Vault response: %w"
  52. errServiceAccount = "cannot read Kubernetes service account token from file system: %w"
  53. errGetKubeSA = "cannot get Kubernetes service account %q: %w"
  54. errGetKubeSASecrets = "cannot find secrets bound to service account: %q"
  55. errGetKubeSANoToken = "cannot find token in secrets bound to service account: %q"
  56. errGetKubeSecret = "cannot get Kubernetes secret %q: %w"
  57. errSecretKeyFmt = "cannot find secret data for key: %q"
  58. errConfigMapFmt = "cannot find config map data for key: %q"
  59. errClientTLSAuth = "error from Client TLS Auth: %q"
  60. errVaultRevokeToken = "error while revoking token: %w"
  61. errUnknownCAProvider = "unknown caProvider type given"
  62. errCANamespace = "cannot read secret for CAProvider due to missing namespace on kind ClusterSecretStore"
  63. )
  64. type Client interface {
  65. NewRequest(method, requestPath string) *vault.Request
  66. RawRequestWithContext(ctx context.Context, r *vault.Request) (*vault.Response, error)
  67. SetToken(v string)
  68. Token() string
  69. ClearToken()
  70. SetNamespace(namespace string)
  71. AddHeader(key, value string)
  72. }
  73. type client struct {
  74. kube kclient.Client
  75. store *esv1alpha1.VaultProvider
  76. log logr.Logger
  77. client Client
  78. namespace string
  79. storeKind string
  80. }
  81. func init() {
  82. schema.Register(&connector{
  83. newVaultClient: newVaultClient,
  84. }, &esv1alpha1.SecretStoreProvider{
  85. Vault: &esv1alpha1.VaultProvider{},
  86. })
  87. }
  88. func newVaultClient(c *vault.Config) (Client, error) {
  89. return vault.NewClient(c)
  90. }
  91. type connector struct {
  92. newVaultClient func(c *vault.Config) (Client, error)
  93. }
  94. func (c *connector) NewClient(ctx context.Context, store esv1alpha1.GenericStore, kube kclient.Client, namespace string) (provider.SecretsClient, error) {
  95. storeSpec := store.GetSpec()
  96. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  97. return nil, errors.New(errVaultStore)
  98. }
  99. vaultSpec := storeSpec.Provider.Vault
  100. vStore := &client{
  101. kube: kube,
  102. store: vaultSpec,
  103. log: ctrl.Log.WithName("provider").WithName("vault"),
  104. namespace: namespace,
  105. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  106. }
  107. cfg, err := vStore.newConfig()
  108. if err != nil {
  109. return nil, err
  110. }
  111. client, err := c.newVaultClient(cfg)
  112. if err != nil {
  113. return nil, fmt.Errorf(errVaultClient, err)
  114. }
  115. if vaultSpec.Namespace != nil {
  116. client.SetNamespace(*vaultSpec.Namespace)
  117. }
  118. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  119. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  120. }
  121. if err := vStore.setAuth(ctx, client, cfg); err != nil {
  122. return nil, err
  123. }
  124. vStore.client = client
  125. return vStore, nil
  126. }
  127. func (v *client) GetSecret(ctx context.Context, ref esv1alpha1.ExternalSecretDataRemoteRef) ([]byte, error) {
  128. data, err := v.readSecret(ctx, ref.Key, ref.Version)
  129. if err != nil {
  130. return nil, err
  131. }
  132. value, exists := data[ref.Property]
  133. if !exists {
  134. return nil, fmt.Errorf(errSecretKeyFmt, ref.Property)
  135. }
  136. return value, nil
  137. }
  138. func (v *client) GetSecretMap(ctx context.Context, ref esv1alpha1.ExternalSecretDataFromRemoteRef) (map[string][]byte, error) {
  139. return v.readSecret(ctx, ref.Extract.Key, ref.Extract.Version)
  140. }
  141. // Implements store.Client.GetAllSecrets Interface.
  142. // New version of GetAllSecrets.
  143. func (v *client) GetAllSecrets(ctx context.Context, ref esv1alpha1.ExternalSecretDataFromRemoteRef) (map[string][]byte, error) {
  144. // TO be implemented
  145. return map[string][]byte{}, nil
  146. }
  147. func (v *client) Close(ctx context.Context) error {
  148. // Revoke the token if we have one set and it wasn't sourced from a TokenSecretRef
  149. if v.client.Token() != "" && v.store.Auth.TokenSecretRef == nil {
  150. req := v.client.NewRequest(http.MethodPost, "/v1/auth/token/revoke-self")
  151. _, err := v.client.RawRequestWithContext(ctx, req)
  152. if err != nil {
  153. return fmt.Errorf(errVaultRevokeToken, err)
  154. }
  155. v.client.ClearToken()
  156. }
  157. return nil
  158. }
  159. func (v *client) buildPath(path string) string {
  160. optionalMount := v.store.Path
  161. origPath := strings.Split(path, "/")
  162. newPath := make([]string, 0)
  163. cursor := 0
  164. if optionalMount != nil && origPath[0] != *optionalMount {
  165. // Default case before path was optional
  166. // Ensure that the requested path includes the SecretStores paths as prefix
  167. newPath = append(newPath, *optionalMount)
  168. } else {
  169. newPath = append(newPath, origPath[cursor])
  170. cursor++
  171. }
  172. if v.store.Version == esv1alpha1.VaultKVStoreV2 {
  173. // Add the required `data` part of the URL for the v2 API
  174. if len(origPath) < 2 || origPath[1] != "data" {
  175. newPath = append(newPath, "data")
  176. }
  177. }
  178. newPath = append(newPath, origPath[cursor:]...)
  179. returnPath := strings.Join(newPath, "/")
  180. return returnPath
  181. }
  182. func (v *client) readSecret(ctx context.Context, path, version string) (map[string][]byte, error) {
  183. dataPath := v.buildPath(path)
  184. // path formated according to vault docs for v1 and v2 API
  185. // v1: https://www.vaultproject.io/api-docs/secret/kv/kv-v1#read-secret
  186. // v2: https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  187. req := v.client.NewRequest(http.MethodGet, fmt.Sprintf("/v1/%s", dataPath))
  188. if version != "" {
  189. req.Params.Set("version", version)
  190. }
  191. resp, err := v.client.RawRequestWithContext(ctx, req)
  192. if err != nil {
  193. return nil, fmt.Errorf(errReadSecret, err)
  194. }
  195. vaultSecret, err := vault.ParseSecret(resp.Body)
  196. if err != nil {
  197. return nil, err
  198. }
  199. secretData := vaultSecret.Data
  200. if v.store.Version == esv1alpha1.VaultKVStoreV2 {
  201. // Vault KV2 has data embedded within sub-field
  202. // reference - https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  203. dataInt, ok := vaultSecret.Data["data"]
  204. if !ok {
  205. return nil, errors.New(errDataField)
  206. }
  207. secretData, ok = dataInt.(map[string]interface{})
  208. if !ok {
  209. return nil, errors.New(errJSONUnmarshall)
  210. }
  211. }
  212. byteMap := make(map[string][]byte, len(secretData))
  213. for k, v := range secretData {
  214. switch t := v.(type) {
  215. case string:
  216. byteMap[k] = []byte(t)
  217. case []byte:
  218. byteMap[k] = t
  219. case nil:
  220. byteMap[k] = []byte(nil)
  221. default:
  222. return nil, errors.New(errSecretFormat)
  223. }
  224. }
  225. return byteMap, nil
  226. }
  227. func (v *client) newConfig() (*vault.Config, error) {
  228. cfg := vault.DefaultConfig()
  229. cfg.Address = v.store.Server
  230. if len(v.store.CABundle) == 0 && v.store.CAProvider == nil {
  231. return cfg, nil
  232. }
  233. caCertPool := x509.NewCertPool()
  234. if len(v.store.CABundle) > 0 {
  235. ok := caCertPool.AppendCertsFromPEM(v.store.CABundle)
  236. if !ok {
  237. return nil, errors.New(errVaultCert)
  238. }
  239. }
  240. if v.store.CAProvider != nil && v.storeKind == esv1alpha1.ClusterSecretStoreKind && v.store.CAProvider.Namespace == nil {
  241. return nil, errors.New(errCANamespace)
  242. }
  243. if v.store.CAProvider != nil {
  244. var cert []byte
  245. var err error
  246. switch v.store.CAProvider.Type {
  247. case esv1alpha1.CAProviderTypeSecret:
  248. cert, err = getCertFromSecret(v)
  249. case esv1alpha1.CAProviderTypeConfigMap:
  250. cert, err = getCertFromConfigMap(v)
  251. default:
  252. return nil, errors.New(errUnknownCAProvider)
  253. }
  254. if err != nil {
  255. return nil, err
  256. }
  257. ok := caCertPool.AppendCertsFromPEM(cert)
  258. if !ok {
  259. return nil, errors.New(errVaultCert)
  260. }
  261. }
  262. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  263. transport.TLSClientConfig.RootCAs = caCertPool
  264. }
  265. // If either read-after-write consistency feature is enabled, enable ReadYourWrites
  266. cfg.ReadYourWrites = v.store.ReadYourWrites || v.store.ForwardInconsistent
  267. return cfg, nil
  268. }
  269. func getCertFromSecret(v *client) ([]byte, error) {
  270. secretRef := esmeta.SecretKeySelector{
  271. Name: v.store.CAProvider.Name,
  272. Key: v.store.CAProvider.Key,
  273. }
  274. if v.store.CAProvider.Namespace != nil {
  275. secretRef.Namespace = v.store.CAProvider.Namespace
  276. }
  277. ctx := context.Background()
  278. res, err := v.secretKeyRef(ctx, &secretRef)
  279. if err != nil {
  280. return nil, fmt.Errorf(errVaultCert, err)
  281. }
  282. return []byte(res), nil
  283. }
  284. func getCertFromConfigMap(v *client) ([]byte, error) {
  285. objKey := types.NamespacedName{
  286. Name: v.store.CAProvider.Name,
  287. }
  288. if v.store.CAProvider.Namespace != nil {
  289. objKey.Namespace = *v.store.CAProvider.Namespace
  290. }
  291. configMapRef := &corev1.ConfigMap{}
  292. ctx := context.Background()
  293. err := v.kube.Get(ctx, objKey, configMapRef)
  294. if err != nil {
  295. return nil, fmt.Errorf(errVaultCert, err)
  296. }
  297. val, ok := configMapRef.Data[v.store.CAProvider.Key]
  298. if !ok {
  299. return nil, fmt.Errorf(errConfigMapFmt, v.store.CAProvider.Key)
  300. }
  301. return []byte(val), nil
  302. }
  303. func (v *client) setAuth(ctx context.Context, client Client, cfg *vault.Config) error {
  304. tokenExists, err := setSecretKeyToken(ctx, v, client)
  305. if tokenExists {
  306. return err
  307. }
  308. tokenExists, err = setAppRoleToken(ctx, v, client)
  309. if tokenExists {
  310. return err
  311. }
  312. tokenExists, err = setKubernetesAuthToken(ctx, v, client)
  313. if tokenExists {
  314. return err
  315. }
  316. tokenExists, err = setLdapAuthToken(ctx, v, client)
  317. if tokenExists {
  318. return err
  319. }
  320. tokenExists, err = setJwtAuthToken(ctx, v, client)
  321. if tokenExists {
  322. return err
  323. }
  324. tokenExists, err = setCertAuthToken(ctx, v, client, cfg)
  325. if tokenExists {
  326. return err
  327. }
  328. return errors.New(errAuthFormat)
  329. }
  330. func setAppRoleToken(ctx context.Context, v *client, client Client) (bool, error) {
  331. tokenRef := v.store.Auth.TokenSecretRef
  332. if tokenRef != nil {
  333. token, err := v.secretKeyRef(ctx, tokenRef)
  334. if err != nil {
  335. return true, err
  336. }
  337. client.SetToken(token)
  338. return true, nil
  339. }
  340. return false, nil
  341. }
  342. func setSecretKeyToken(ctx context.Context, v *client, client Client) (bool, error) {
  343. appRole := v.store.Auth.AppRole
  344. if appRole != nil {
  345. token, err := v.requestTokenWithAppRoleRef(ctx, client, appRole)
  346. if err != nil {
  347. return true, err
  348. }
  349. client.SetToken(token)
  350. return true, nil
  351. }
  352. return false, nil
  353. }
  354. func setKubernetesAuthToken(ctx context.Context, v *client, client Client) (bool, error) {
  355. kubernetesAuth := v.store.Auth.Kubernetes
  356. if kubernetesAuth != nil {
  357. token, err := v.requestTokenWithKubernetesAuth(ctx, client, kubernetesAuth)
  358. if err != nil {
  359. return true, err
  360. }
  361. client.SetToken(token)
  362. return true, nil
  363. }
  364. return false, nil
  365. }
  366. func setLdapAuthToken(ctx context.Context, v *client, client Client) (bool, error) {
  367. ldapAuth := v.store.Auth.Ldap
  368. if ldapAuth != nil {
  369. token, err := v.requestTokenWithLdapAuth(ctx, client, ldapAuth)
  370. if err != nil {
  371. return true, err
  372. }
  373. client.SetToken(token)
  374. return true, nil
  375. }
  376. return false, nil
  377. }
  378. func setJwtAuthToken(ctx context.Context, v *client, client Client) (bool, error) {
  379. jwtAuth := v.store.Auth.Jwt
  380. if jwtAuth != nil {
  381. token, err := v.requestTokenWithJwtAuth(ctx, client, jwtAuth)
  382. if err != nil {
  383. return true, err
  384. }
  385. client.SetToken(token)
  386. return true, nil
  387. }
  388. return false, nil
  389. }
  390. func setCertAuthToken(ctx context.Context, v *client, client Client, cfg *vault.Config) (bool, error) {
  391. certAuth := v.store.Auth.Cert
  392. if certAuth != nil {
  393. token, err := v.requestTokenWithCertAuth(ctx, client, certAuth, cfg)
  394. if err != nil {
  395. return true, err
  396. }
  397. client.SetToken(token)
  398. return true, nil
  399. }
  400. return false, nil
  401. }
  402. func (v *client) secretKeyRefForServiceAccount(ctx context.Context, serviceAccountRef *esmeta.ServiceAccountSelector) (string, error) {
  403. serviceAccount := &corev1.ServiceAccount{}
  404. ref := types.NamespacedName{
  405. Namespace: v.namespace,
  406. Name: serviceAccountRef.Name,
  407. }
  408. if (v.storeKind == esv1alpha1.ClusterSecretStoreKind) &&
  409. (serviceAccountRef.Namespace != nil) {
  410. ref.Namespace = *serviceAccountRef.Namespace
  411. }
  412. err := v.kube.Get(ctx, ref, serviceAccount)
  413. if err != nil {
  414. return "", fmt.Errorf(errGetKubeSA, ref.Name, err)
  415. }
  416. if len(serviceAccount.Secrets) == 0 {
  417. return "", fmt.Errorf(errGetKubeSASecrets, ref.Name)
  418. }
  419. for _, tokenRef := range serviceAccount.Secrets {
  420. retval, err := v.secretKeyRef(ctx, &esmeta.SecretKeySelector{
  421. Name: tokenRef.Name,
  422. Namespace: &ref.Namespace,
  423. Key: "token",
  424. })
  425. if err != nil {
  426. continue
  427. }
  428. return retval, nil
  429. }
  430. return "", fmt.Errorf(errGetKubeSANoToken, ref.Name)
  431. }
  432. func (v *client) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  433. secret := &corev1.Secret{}
  434. ref := types.NamespacedName{
  435. Namespace: v.namespace,
  436. Name: secretRef.Name,
  437. }
  438. if (v.storeKind == esv1alpha1.ClusterSecretStoreKind) &&
  439. (secretRef.Namespace != nil) {
  440. ref.Namespace = *secretRef.Namespace
  441. }
  442. err := v.kube.Get(ctx, ref, secret)
  443. if err != nil {
  444. return "", fmt.Errorf(errGetKubeSecret, ref.Name, err)
  445. }
  446. keyBytes, ok := secret.Data[secretRef.Key]
  447. if !ok {
  448. return "", fmt.Errorf(errSecretKeyFmt, secretRef.Key)
  449. }
  450. value := string(keyBytes)
  451. valueStr := strings.TrimSpace(value)
  452. return valueStr, nil
  453. }
  454. // appRoleParameters creates the required body for Vault AppRole Auth.
  455. // Reference - https://www.vaultproject.io/api-docs/auth/approle#login-with-approle
  456. func appRoleParameters(role, secret string) map[string]string {
  457. return map[string]string{
  458. "role_id": role,
  459. "secret_id": secret,
  460. }
  461. }
  462. func (v *client) requestTokenWithAppRoleRef(ctx context.Context, client Client, appRole *esv1alpha1.VaultAppRole) (string, error) {
  463. roleID := strings.TrimSpace(appRole.RoleID)
  464. secretID, err := v.secretKeyRef(ctx, &appRole.SecretRef)
  465. if err != nil {
  466. return "", err
  467. }
  468. parameters := appRoleParameters(roleID, secretID)
  469. url := strings.Join([]string{"/v1", "auth", appRole.Path, "login"}, "/")
  470. request := client.NewRequest("POST", url)
  471. err = request.SetJSONBody(parameters)
  472. if err != nil {
  473. return "", fmt.Errorf(errVaultReqParams, err)
  474. }
  475. resp, err := client.RawRequestWithContext(ctx, request)
  476. if err != nil {
  477. return "", fmt.Errorf(errVaultRequest, err)
  478. }
  479. defer resp.Body.Close()
  480. vaultResult := vault.Secret{}
  481. if err = resp.DecodeJSON(&vaultResult); err != nil {
  482. return "", fmt.Errorf(errVaultResponse, err)
  483. }
  484. token, err := vaultResult.TokenID()
  485. if err != nil {
  486. return "", fmt.Errorf(errVaultToken, err)
  487. }
  488. return token, nil
  489. }
  490. // kubeParameters creates the required body for Vault Kubernetes auth.
  491. // Reference - https://www.vaultproject.io/api/auth/kubernetes#login
  492. func kubeParameters(role, jwt string) map[string]string {
  493. return map[string]string{
  494. "role": role,
  495. "jwt": jwt,
  496. }
  497. }
  498. func (v *client) requestTokenWithKubernetesAuth(ctx context.Context, client Client, kubernetesAuth *esv1alpha1.VaultKubernetesAuth) (string, error) {
  499. jwtString, err := getJwtString(ctx, v, kubernetesAuth)
  500. if err != nil {
  501. return "", err
  502. }
  503. parameters := kubeParameters(kubernetesAuth.Role, jwtString)
  504. url := strings.Join([]string{"/v1", "auth", kubernetesAuth.Path, "login"}, "/")
  505. request := client.NewRequest("POST", url)
  506. err = request.SetJSONBody(parameters)
  507. if err != nil {
  508. return "", fmt.Errorf(errVaultReqParams, err)
  509. }
  510. resp, err := client.RawRequestWithContext(ctx, request)
  511. if err != nil {
  512. return "", fmt.Errorf(errVaultRequest, err)
  513. }
  514. defer resp.Body.Close()
  515. vaultResult := vault.Secret{}
  516. err = resp.DecodeJSON(&vaultResult)
  517. if err != nil {
  518. return "", fmt.Errorf(errVaultResponse, err)
  519. }
  520. token, err := vaultResult.TokenID()
  521. if err != nil {
  522. return "", fmt.Errorf(errVaultToken, err)
  523. }
  524. return token, nil
  525. }
  526. func getJwtString(ctx context.Context, v *client, kubernetesAuth *esv1alpha1.VaultKubernetesAuth) (string, error) {
  527. if kubernetesAuth.ServiceAccountRef != nil {
  528. jwt, err := v.secretKeyRefForServiceAccount(ctx, kubernetesAuth.ServiceAccountRef)
  529. if err != nil {
  530. return "", err
  531. }
  532. return jwt, nil
  533. } else if kubernetesAuth.SecretRef != nil {
  534. tokenRef := kubernetesAuth.SecretRef
  535. if tokenRef.Key == "" {
  536. tokenRef = kubernetesAuth.SecretRef.DeepCopy()
  537. tokenRef.Key = "token"
  538. }
  539. jwt, err := v.secretKeyRef(ctx, tokenRef)
  540. if err != nil {
  541. return "", err
  542. }
  543. return jwt, nil
  544. } else {
  545. // Kubernetes authentication is specified, but without a referenced
  546. // Kubernetes secret. We check if the file path for in-cluster service account
  547. // exists and attempt to use the token for Vault Kubernetes auth.
  548. if _, err := os.Stat(serviceAccTokenPath); err != nil {
  549. return "", fmt.Errorf(errServiceAccount, err)
  550. }
  551. jwtByte, err := ioutil.ReadFile(serviceAccTokenPath)
  552. if err != nil {
  553. return "", fmt.Errorf(errServiceAccount, err)
  554. }
  555. return string(jwtByte), nil
  556. }
  557. }
  558. func (v *client) requestTokenWithLdapAuth(ctx context.Context, client Client, ldapAuth *esv1alpha1.VaultLdapAuth) (string, error) {
  559. username := strings.TrimSpace(ldapAuth.Username)
  560. password, err := v.secretKeyRef(ctx, &ldapAuth.SecretRef)
  561. if err != nil {
  562. return "", err
  563. }
  564. parameters := map[string]string{
  565. "password": password,
  566. }
  567. url := strings.Join([]string{"/v1", "auth", ldapAuth.Path, "login", username}, "/")
  568. request := client.NewRequest("POST", url)
  569. err = request.SetJSONBody(parameters)
  570. if err != nil {
  571. return "", fmt.Errorf(errVaultReqParams, err)
  572. }
  573. resp, err := client.RawRequestWithContext(ctx, request)
  574. if err != nil {
  575. return "", fmt.Errorf(errVaultRequest, err)
  576. }
  577. defer resp.Body.Close()
  578. vaultResult := vault.Secret{}
  579. if err = resp.DecodeJSON(&vaultResult); err != nil {
  580. return "", fmt.Errorf(errVaultResponse, err)
  581. }
  582. token, err := vaultResult.TokenID()
  583. if err != nil {
  584. return "", fmt.Errorf(errVaultToken, err)
  585. }
  586. return token, nil
  587. }
  588. func (v *client) requestTokenWithJwtAuth(ctx context.Context, client Client, jwtAuth *esv1alpha1.VaultJwtAuth) (string, error) {
  589. role := strings.TrimSpace(jwtAuth.Role)
  590. jwt, err := v.secretKeyRef(ctx, &jwtAuth.SecretRef)
  591. if err != nil {
  592. return "", err
  593. }
  594. parameters := map[string]string{
  595. "role": role,
  596. "jwt": jwt,
  597. }
  598. url := strings.Join([]string{"/v1", "auth", jwtAuth.Path, "login"}, "/")
  599. request := client.NewRequest("POST", url)
  600. err = request.SetJSONBody(parameters)
  601. if err != nil {
  602. return "", fmt.Errorf(errVaultReqParams, err)
  603. }
  604. resp, err := client.RawRequestWithContext(ctx, request)
  605. if err != nil {
  606. return "", fmt.Errorf(errVaultRequest, err)
  607. }
  608. defer resp.Body.Close()
  609. vaultResult := vault.Secret{}
  610. if err = resp.DecodeJSON(&vaultResult); err != nil {
  611. return "", fmt.Errorf(errVaultResponse, err)
  612. }
  613. token, err := vaultResult.TokenID()
  614. if err != nil {
  615. return "", fmt.Errorf(errVaultToken, err)
  616. }
  617. return token, nil
  618. }
  619. func (v *client) requestTokenWithCertAuth(ctx context.Context, client Client, certAuth *esv1alpha1.VaultCertAuth, cfg *vault.Config) (string, error) {
  620. clientKey, err := v.secretKeyRef(ctx, &certAuth.SecretRef)
  621. if err != nil {
  622. return "", err
  623. }
  624. clientCert, err := v.secretKeyRef(ctx, &certAuth.ClientCert)
  625. if err != nil {
  626. return "", err
  627. }
  628. cert, err := tls.X509KeyPair([]byte(clientCert), []byte(clientKey))
  629. if err != nil {
  630. return "", fmt.Errorf(errClientTLSAuth, err)
  631. }
  632. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  633. transport.TLSClientConfig.Certificates = []tls.Certificate{cert}
  634. }
  635. url := strings.Join([]string{"/v1", "auth", "cert", "login"}, "/")
  636. request := client.NewRequest("POST", url)
  637. resp, err := client.RawRequestWithContext(ctx, request)
  638. if err != nil {
  639. return "", fmt.Errorf(errVaultRequest, err)
  640. }
  641. defer resp.Body.Close()
  642. vaultResult := vault.Secret{}
  643. if err = resp.DecodeJSON(&vaultResult); err != nil {
  644. return "", fmt.Errorf(errVaultResponse, err)
  645. }
  646. token, err := vaultResult.TokenID()
  647. if err != nil {
  648. return "", fmt.Errorf(errVaultToken, err)
  649. }
  650. return token, nil
  651. }