akeyless.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "net/url"
  22. "strconv"
  23. "strings"
  24. "time"
  25. "github.com/akeylesslabs/akeyless-go/v3"
  26. "github.com/tidwall/gjson"
  27. corev1 "k8s.io/api/core/v1"
  28. "k8s.io/client-go/kubernetes"
  29. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  30. "sigs.k8s.io/controller-runtime/pkg/client"
  31. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  32. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  33. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  34. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  35. "github.com/external-secrets/external-secrets/pkg/find"
  36. "github.com/external-secrets/external-secrets/pkg/utils"
  37. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  38. )
  39. const (
  40. defaultAPIUrl = "https://api.akeyless.io"
  41. errNotImplemented = "not implemented"
  42. )
  43. // https://github.com/external-secrets/external-secrets/issues/644
  44. var _ esv1beta1.SecretsClient = &Akeyless{}
  45. var _ esv1beta1.Provider = &Provider{}
  46. // Provider satisfies the provider interface.
  47. type Provider struct{}
  48. // akeylessBase satisfies the provider.SecretsClient interface.
  49. type akeylessBase struct {
  50. kube client.Client
  51. store esv1beta1.GenericStore
  52. storeKind string
  53. corev1 typedcorev1.CoreV1Interface
  54. namespace string
  55. akeylessGwAPIURL string
  56. RestAPI *akeyless.V2ApiService
  57. }
  58. type Akeyless struct {
  59. Client akeylessVaultInterface
  60. url string
  61. }
  62. type Item struct {
  63. ItemName string `json:"item_name"`
  64. ItemType string `json:"item_type"`
  65. LastVersion int32 `json:"last_version"`
  66. }
  67. type akeylessVaultInterface interface {
  68. GetSecretByType(ctx context.Context, secretName, token string, version int32) (string, error)
  69. TokenFromSecretRef(ctx context.Context) (string, error)
  70. ListSecrets(ctx context.Context, path, tag, token string) ([]string, error)
  71. }
  72. func init() {
  73. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  74. Akeyless: &esv1beta1.AkeylessProvider{},
  75. })
  76. }
  77. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  78. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  79. return esv1beta1.SecretStoreReadOnly
  80. }
  81. // NewClient constructs a new secrets client based on the provided store.
  82. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  83. // controller-runtime/client does not support TokenRequest or other subresource APIs
  84. // so we need to construct our own client and use it to fetch tokens
  85. // (for Kubernetes service account token auth)
  86. restCfg, err := ctrlcfg.GetConfig()
  87. if err != nil {
  88. return nil, err
  89. }
  90. clientset, err := kubernetes.NewForConfig(restCfg)
  91. if err != nil {
  92. return nil, err
  93. }
  94. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  95. }
  96. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  97. storeSpec := store.GetSpec()
  98. akeylessSpec := storeSpec.Provider.Akeyless
  99. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  100. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  101. url, err := url.Parse(*akeylessGWApiURL)
  102. if err != nil {
  103. return nil, fmt.Errorf(errInvalidAkeylessURL)
  104. }
  105. if url.Host == "" {
  106. return nil, fmt.Errorf(errInvalidAkeylessURL)
  107. }
  108. }
  109. if akeylessSpec.Auth.KubernetesAuth != nil {
  110. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  111. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  112. return nil, fmt.Errorf(errInvalidKubeSA, err)
  113. }
  114. }
  115. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  116. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  117. if err != nil {
  118. return nil, err
  119. }
  120. }
  121. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  122. return nil, fmt.Errorf("missing kubernetes auth-method access-id")
  123. }
  124. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  125. return nil, fmt.Errorf("missing kubernetes config name")
  126. }
  127. return nil, nil
  128. }
  129. accessID := akeylessSpec.Auth.SecretRef.AccessID
  130. err := utils.ValidateSecretSelector(store, accessID)
  131. if err != nil {
  132. return nil, err
  133. }
  134. if accessID.Name == "" {
  135. return nil, fmt.Errorf(errInvalidAkeylessAccessIDName)
  136. }
  137. if accessID.Key == "" {
  138. return nil, fmt.Errorf(errInvalidAkeylessAccessIDKey)
  139. }
  140. accessType := akeylessSpec.Auth.SecretRef.AccessType
  141. err = utils.ValidateSecretSelector(store, accessType)
  142. if err != nil {
  143. return nil, err
  144. }
  145. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  146. err = utils.ValidateSecretSelector(store, accessTypeParam)
  147. if err != nil {
  148. return nil, err
  149. }
  150. return nil, nil
  151. }
  152. func newClient(_ context.Context, store esv1beta1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  153. akl := &akeylessBase{
  154. kube: kube,
  155. store: store,
  156. namespace: namespace,
  157. corev1: corev1,
  158. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  159. }
  160. spec, err := GetAKeylessProvider(store)
  161. if err != nil {
  162. return nil, err
  163. }
  164. akeylessGwAPIURL := defaultAPIUrl
  165. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  166. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  167. }
  168. if spec.Auth == nil {
  169. return nil, fmt.Errorf("missing Auth in store config")
  170. }
  171. client, err := akl.getAkeylessHTTPClient(spec)
  172. if err != nil {
  173. return nil, err
  174. }
  175. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  176. HTTPClient: client,
  177. Servers: []akeyless.ServerConfiguration{
  178. {
  179. URL: akeylessGwAPIURL,
  180. },
  181. },
  182. }).V2Api
  183. akl.akeylessGwAPIURL = akeylessGwAPIURL
  184. akl.RestAPI = RestAPIClient
  185. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  186. }
  187. func (a *Akeyless) Close(_ context.Context) error {
  188. return nil
  189. }
  190. func (a *Akeyless) Validate() (esv1beta1.ValidationResult, error) {
  191. timeout := 15 * time.Second
  192. url := a.url
  193. if err := utils.NetworkValidate(url, timeout); err != nil {
  194. return esv1beta1.ValidationResultError, err
  195. }
  196. return esv1beta1.ValidationResultReady, nil
  197. }
  198. func (a *Akeyless) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  199. return fmt.Errorf(errNotImplemented)
  200. }
  201. func (a *Akeyless) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  202. return fmt.Errorf(errNotImplemented)
  203. }
  204. func (a *Akeyless) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  205. return false, fmt.Errorf(errNotImplemented)
  206. }
  207. // Implements store.Client.GetSecret Interface.
  208. // Retrieves a secret with the secret name defined in ref.Name.
  209. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  210. if utils.IsNil(a.Client) {
  211. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  212. }
  213. token, err := a.Client.TokenFromSecretRef(ctx)
  214. if err != nil {
  215. return nil, err
  216. }
  217. version := int32(0)
  218. if ref.Version != "" {
  219. i, err := strconv.ParseInt(ref.Version, 10, 32)
  220. if err == nil {
  221. version = int32(i)
  222. }
  223. }
  224. value, err := a.Client.GetSecretByType(ctx, ref.Key, token, version)
  225. if err != nil {
  226. return nil, err
  227. }
  228. if ref.Property == "" {
  229. if value != "" {
  230. return []byte(value), nil
  231. }
  232. return nil, fmt.Errorf("invalid value received, found no value string : %s", ref.Key)
  233. }
  234. // We need to search if a given key with a . exists before using gjson operations.
  235. idx := strings.Index(ref.Property, ".")
  236. if idx > -1 {
  237. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  238. val := gjson.Get(value, refProperty)
  239. if val.Exists() {
  240. return []byte(val.String()), nil
  241. }
  242. }
  243. val := gjson.Get(value, ref.Property)
  244. if !val.Exists() {
  245. return nil, fmt.Errorf("key %s does not exist in value %s", ref.Property, ref.Key)
  246. }
  247. return []byte(val.String()), nil
  248. }
  249. // Implements store.Client.GetAllSecrets Interface.
  250. // Retrieves a all secrets with defined in ref.Name or tags.
  251. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  252. if utils.IsNil(a.Client) {
  253. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  254. }
  255. searchPath := ""
  256. if ref.Path != nil {
  257. searchPath = *ref.Path
  258. if !strings.HasPrefix(searchPath, "/") {
  259. searchPath = "/" + searchPath
  260. }
  261. if !strings.HasSuffix(searchPath, "/") {
  262. searchPath += "/"
  263. }
  264. }
  265. token, err := a.Client.TokenFromSecretRef(ctx)
  266. if err != nil {
  267. return nil, err
  268. }
  269. if ref.Name != nil {
  270. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "", token)
  271. if err != nil {
  272. return nil, err
  273. }
  274. if len(potentialSecrets) == 0 {
  275. return nil, nil
  276. }
  277. return a.findSecretsFromName(ctx, potentialSecrets, *ref.Name, token)
  278. }
  279. if len(ref.Tags) > 0 {
  280. var potentialSecretsName []string
  281. for _, v := range ref.Tags {
  282. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v, token)
  283. if err != nil {
  284. return nil, err
  285. }
  286. if len(potentialSecrets) > 0 {
  287. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  288. }
  289. }
  290. if len(potentialSecretsName) == 0 {
  291. return nil, nil
  292. }
  293. return a.getSecrets(ctx, potentialSecretsName, token)
  294. }
  295. return nil, errors.New("unexpected find operator")
  296. }
  297. func (a *Akeyless) getSecrets(ctx context.Context, candidates []string, token string) (map[string][]byte, error) {
  298. secrets := make(map[string][]byte)
  299. for _, name := range candidates {
  300. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  301. if err != nil {
  302. return nil, err
  303. }
  304. if secretValue != "" {
  305. secrets[name] = []byte(secretValue)
  306. }
  307. }
  308. return secrets, nil
  309. }
  310. func (a *Akeyless) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName, token string) (map[string][]byte, error) {
  311. secrets := make(map[string][]byte)
  312. matcher, err := find.New(ref)
  313. if err != nil {
  314. return nil, err
  315. }
  316. for _, name := range candidates {
  317. ok := matcher.MatchName(name)
  318. if ok {
  319. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  320. if err != nil {
  321. return nil, err
  322. }
  323. if secretValue != "" {
  324. secrets[name] = []byte(secretValue)
  325. }
  326. }
  327. }
  328. return secrets, nil
  329. }
  330. // Implements store.Client.GetSecretMap Interface.
  331. // New version of GetSecretMap.
  332. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  333. if utils.IsNil(a.Client) {
  334. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  335. }
  336. val, err := a.GetSecret(ctx, ref)
  337. if err != nil {
  338. return nil, err
  339. }
  340. // Maps the json data to a string:string map
  341. kv := make(map[string]string)
  342. err = json.Unmarshal(val, &kv)
  343. if err != nil {
  344. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  345. }
  346. // Converts values in K:V pairs into bytes, while leaving keys as strings
  347. secretData := make(map[string][]byte)
  348. for k, v := range kv {
  349. secretData[k] = []byte(v)
  350. }
  351. return secretData, nil
  352. }
  353. func (a *akeylessBase) getAkeylessHTTPClient(provider *esv1beta1.AkeylessProvider) (*http.Client, error) {
  354. client := &http.Client{Timeout: 30 * time.Second}
  355. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  356. return client, nil
  357. }
  358. caCertPool, err := a.getCACertPool(provider)
  359. if err != nil {
  360. return nil, err
  361. }
  362. tlsConf := &tls.Config{
  363. RootCAs: caCertPool,
  364. MinVersion: tls.VersionTLS12,
  365. }
  366. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  367. return client, nil
  368. }
  369. func (a *akeylessBase) getCACertPool(provider *esv1beta1.AkeylessProvider) (*x509.CertPool, error) {
  370. caCertPool := x509.NewCertPool()
  371. if len(provider.CABundle) > 0 {
  372. pem, err := base64decode(provider.CABundle)
  373. if err != nil {
  374. pem = provider.CABundle
  375. }
  376. ok := caCertPool.AppendCertsFromPEM(pem)
  377. if !ok {
  378. return nil, fmt.Errorf("failed to append caBundle")
  379. }
  380. }
  381. if provider.CAProvider != nil &&
  382. a.storeKind == esv1beta1.ClusterSecretStoreKind &&
  383. provider.CAProvider.Namespace == nil {
  384. return nil, fmt.Errorf("missing namespace on caProvider secret")
  385. }
  386. if provider.CAProvider != nil {
  387. var cert []byte
  388. var err error
  389. switch provider.CAProvider.Type {
  390. case esv1beta1.CAProviderTypeSecret:
  391. cert, err = a.getCertFromSecret(provider)
  392. case esv1beta1.CAProviderTypeConfigMap:
  393. cert, err = a.getCertFromConfigMap(provider)
  394. default:
  395. err = fmt.Errorf("unknown CAProvider type: %s", provider.CAProvider.Type)
  396. }
  397. if err != nil {
  398. return nil, err
  399. }
  400. pem, err := base64decode(cert)
  401. if err != nil {
  402. pem = cert
  403. }
  404. ok := caCertPool.AppendCertsFromPEM(pem)
  405. if !ok {
  406. return nil, fmt.Errorf("failed to append caBundle")
  407. }
  408. }
  409. return caCertPool, nil
  410. }
  411. func (a *akeylessBase) getCertFromSecret(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  412. secretRef := esmeta.SecretKeySelector{
  413. Name: provider.CAProvider.Name,
  414. Key: provider.CAProvider.Key,
  415. }
  416. if provider.CAProvider.Namespace != nil {
  417. secretRef.Namespace = provider.CAProvider.Namespace
  418. }
  419. ctx := context.Background()
  420. cert, err := resolvers.SecretKeyRef(ctx, a.kube, a.storeKind, a.namespace, &secretRef)
  421. if err != nil {
  422. return nil, err
  423. }
  424. return []byte(cert), nil
  425. }
  426. func (a *akeylessBase) getCertFromConfigMap(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  427. objKey := client.ObjectKey{
  428. Name: provider.CAProvider.Name,
  429. }
  430. if provider.CAProvider.Namespace != nil {
  431. objKey.Namespace = *provider.CAProvider.Namespace
  432. }
  433. configMapRef := &corev1.ConfigMap{}
  434. ctx := context.Background()
  435. err := a.kube.Get(ctx, objKey, configMapRef)
  436. if err != nil {
  437. return nil, fmt.Errorf("failed to get caProvider secret %s: %w", objKey.Name, err)
  438. }
  439. val, ok := configMapRef.Data[provider.CAProvider.Key]
  440. if !ok {
  441. return nil, fmt.Errorf("failed to get caProvider configMap %s -> %s", objKey.Name, provider.CAProvider.Key)
  442. }
  443. return []byte(val), nil
  444. }