keyvault.go 39 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package keyvault
  13. import (
  14. "context"
  15. "crypto/x509"
  16. b64 "encoding/base64"
  17. "encoding/json"
  18. "encoding/pem"
  19. "errors"
  20. "fmt"
  21. "os"
  22. "path"
  23. "regexp"
  24. "strings"
  25. "github.com/Azure/azure-sdk-for-go/profiles/latest/keyvault/keyvault"
  26. "github.com/Azure/go-autorest/autorest"
  27. "github.com/Azure/go-autorest/autorest/adal"
  28. "github.com/Azure/go-autorest/autorest/azure"
  29. kvauth "github.com/Azure/go-autorest/autorest/azure/auth"
  30. "github.com/AzureAD/microsoft-authentication-library-for-go/apps/confidential"
  31. "github.com/lestrrat-go/jwx/v2/jwk"
  32. "github.com/tidwall/gjson"
  33. "golang.org/x/crypto/pkcs12"
  34. "golang.org/x/crypto/sha3"
  35. authv1 "k8s.io/api/authentication/v1"
  36. corev1 "k8s.io/api/core/v1"
  37. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  38. "k8s.io/apimachinery/pkg/types"
  39. "k8s.io/client-go/kubernetes"
  40. kcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  41. pointer "k8s.io/utils/ptr"
  42. "sigs.k8s.io/controller-runtime/pkg/client"
  43. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  44. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  45. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  46. "github.com/external-secrets/external-secrets/pkg/constants"
  47. "github.com/external-secrets/external-secrets/pkg/metrics"
  48. "github.com/external-secrets/external-secrets/pkg/utils"
  49. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  50. )
  51. const (
  52. defaultObjType = "secret"
  53. objectTypeCert = "cert"
  54. objectTypeKey = "key"
  55. AzureDefaultAudience = "api://AzureADTokenExchange"
  56. AnnotationClientID = "azure.workload.identity/client-id"
  57. AnnotationTenantID = "azure.workload.identity/tenant-id"
  58. managerLabel = "external-secrets"
  59. errUnexpectedStoreSpec = "unexpected store spec"
  60. errMissingAuthType = "cannot initialize Azure Client: no valid authType was specified"
  61. errPropNotExist = "property %s does not exist in key %s"
  62. errTagNotExist = "tag %s does not exist"
  63. errUnknownObjectType = "unknown Azure Keyvault object Type for %s"
  64. errUnmarshalJSONData = "error unmarshalling json data: %w"
  65. errDataFromCert = "cannot get use dataFrom to get certificate secret"
  66. errDataFromKey = "cannot get use dataFrom to get key secret"
  67. errMissingTenant = "missing tenantID in store config"
  68. errMissingClient = "missing clientID: either serviceAccountRef or service account annotation '%s' is missing"
  69. errMissingSecretRef = "missing secretRef in provider config"
  70. errMissingClientIDSecret = "missing accessKeyID/secretAccessKey in store config"
  71. errInvalidClientCredentials = "both clientSecret and clientCredentials set"
  72. errMultipleClientID = "multiple clientID found. Check secretRef and serviceAccountRef"
  73. errMultipleTenantID = "multiple tenantID found. Check secretRef, 'spec.provider.azurekv.tenantId', and serviceAccountRef"
  74. errFindSecret = "could not find secret %s/%s: %w"
  75. errFindDataKey = "no data for %q in secret '%s/%s'"
  76. errInvalidStore = "invalid store"
  77. errInvalidStoreSpec = "invalid store spec"
  78. errInvalidStoreProv = "invalid store provider"
  79. errInvalidAzureProv = "invalid azure keyvault provider"
  80. errInvalidSecRefClientID = "invalid AuthSecretRef.ClientID: %w"
  81. errInvalidSecRefClientSecret = "invalid AuthSecretRef.ClientSecret: %w"
  82. errInvalidSecRefClientCertificate = "invalid AuthSecretRef.ClientCertificate: %w"
  83. errInvalidSARef = "invalid ServiceAccountRef: %w"
  84. errMissingWorkloadEnvVars = "missing environment variables. AZURE_CLIENT_ID, AZURE_TENANT_ID and AZURE_FEDERATED_TOKEN_FILE must be set"
  85. errReadTokenFile = "unable to read token file %s: %w"
  86. errMissingSAAnnotation = "missing service account annotation: %s"
  87. )
  88. // https://github.com/external-secrets/external-secrets/issues/644
  89. var _ esv1beta1.SecretsClient = &Azure{}
  90. var _ esv1beta1.Provider = &Azure{}
  91. // interface to keyvault.BaseClient.
  92. type SecretClient interface {
  93. GetKey(ctx context.Context, vaultBaseURL string, keyName string, keyVersion string) (result keyvault.KeyBundle, err error)
  94. GetSecret(ctx context.Context, vaultBaseURL string, secretName string, secretVersion string) (result keyvault.SecretBundle, err error)
  95. GetSecretsComplete(ctx context.Context, vaultBaseURL string, maxresults *int32) (result keyvault.SecretListResultIterator, err error)
  96. GetCertificate(ctx context.Context, vaultBaseURL string, certificateName string, certificateVersion string) (result keyvault.CertificateBundle, err error)
  97. SetSecret(ctx context.Context, vaultBaseURL string, secretName string, parameters keyvault.SecretSetParameters) (result keyvault.SecretBundle, err error)
  98. ImportKey(ctx context.Context, vaultBaseURL string, keyName string, parameters keyvault.KeyImportParameters) (result keyvault.KeyBundle, err error)
  99. ImportCertificate(ctx context.Context, vaultBaseURL string, certificateName string, parameters keyvault.CertificateImportParameters) (result keyvault.CertificateBundle, err error)
  100. DeleteCertificate(ctx context.Context, vaultBaseURL string, certificateName string) (result keyvault.DeletedCertificateBundle, err error)
  101. DeleteKey(ctx context.Context, vaultBaseURL string, keyName string) (result keyvault.DeletedKeyBundle, err error)
  102. DeleteSecret(ctx context.Context, vaultBaseURL string, secretName string) (result keyvault.DeletedSecretBundle, err error)
  103. }
  104. type Azure struct {
  105. crClient client.Client
  106. kubeClient kcorev1.CoreV1Interface
  107. store esv1beta1.GenericStore
  108. provider *esv1beta1.AzureKVProvider
  109. baseClient SecretClient
  110. namespace string
  111. }
  112. func init() {
  113. esv1beta1.Register(&Azure{}, &esv1beta1.SecretStoreProvider{
  114. AzureKV: &esv1beta1.AzureKVProvider{},
  115. })
  116. }
  117. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  118. func (a *Azure) Capabilities() esv1beta1.SecretStoreCapabilities {
  119. return esv1beta1.SecretStoreReadWrite
  120. }
  121. // NewClient constructs a new secrets client based on the provided store.
  122. func (a *Azure) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  123. return newClient(ctx, store, kube, namespace)
  124. }
  125. func newClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  126. provider, err := getProvider(store)
  127. if err != nil {
  128. return nil, err
  129. }
  130. cfg, err := ctrlcfg.GetConfig()
  131. if err != nil {
  132. return nil, err
  133. }
  134. kubeClient, err := kubernetes.NewForConfig(cfg)
  135. if err != nil {
  136. return nil, err
  137. }
  138. az := &Azure{
  139. crClient: kube,
  140. kubeClient: kubeClient.CoreV1(),
  141. store: store,
  142. namespace: namespace,
  143. provider: provider,
  144. }
  145. // allow SecretStore controller validation to pass
  146. // when using referent namespace.
  147. if store.GetKind() == esv1beta1.ClusterSecretStoreKind &&
  148. namespace == "" &&
  149. isReferentSpec(provider) {
  150. return az, nil
  151. }
  152. var authorizer autorest.Authorizer
  153. switch *provider.AuthType {
  154. case esv1beta1.AzureManagedIdentity:
  155. authorizer, err = az.authorizerForManagedIdentity()
  156. case esv1beta1.AzureServicePrincipal:
  157. authorizer, err = az.authorizerForServicePrincipal(ctx)
  158. case esv1beta1.AzureWorkloadIdentity:
  159. authorizer, err = az.authorizerForWorkloadIdentity(ctx, NewTokenProvider)
  160. default:
  161. err = fmt.Errorf(errMissingAuthType)
  162. }
  163. cl := keyvault.New()
  164. cl.Authorizer = authorizer
  165. az.baseClient = &cl
  166. return az, err
  167. }
  168. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.AzureKVProvider, error) {
  169. spc := store.GetSpec()
  170. if spc == nil || spc.Provider.AzureKV == nil {
  171. return nil, errors.New(errUnexpectedStoreSpec)
  172. }
  173. return spc.Provider.AzureKV, nil
  174. }
  175. func (a *Azure) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  176. if store == nil {
  177. return nil, fmt.Errorf(errInvalidStore)
  178. }
  179. spc := store.GetSpec()
  180. if spc == nil {
  181. return nil, fmt.Errorf(errInvalidStoreSpec)
  182. }
  183. if spc.Provider == nil {
  184. return nil, fmt.Errorf(errInvalidStoreProv)
  185. }
  186. p := spc.Provider.AzureKV
  187. if p == nil {
  188. return nil, fmt.Errorf(errInvalidAzureProv)
  189. }
  190. if p.AuthSecretRef != nil {
  191. if p.AuthSecretRef.ClientID != nil {
  192. if err := utils.ValidateReferentSecretSelector(store, *p.AuthSecretRef.ClientID); err != nil {
  193. return nil, fmt.Errorf(errInvalidSecRefClientID, err)
  194. }
  195. }
  196. if p.AuthSecretRef.ClientSecret != nil {
  197. if err := utils.ValidateReferentSecretSelector(store, *p.AuthSecretRef.ClientSecret); err != nil {
  198. return nil, fmt.Errorf(errInvalidSecRefClientSecret, err)
  199. }
  200. }
  201. }
  202. if p.ServiceAccountRef != nil {
  203. if err := utils.ValidateReferentServiceAccountSelector(store, *p.ServiceAccountRef); err != nil {
  204. return nil, fmt.Errorf(errInvalidSARef, err)
  205. }
  206. }
  207. return nil, nil
  208. }
  209. func canDelete(tags map[string]*string, err error) (bool, error) {
  210. aerr := &autorest.DetailedError{}
  211. conv := errors.As(err, aerr)
  212. if err != nil && !conv {
  213. return false, fmt.Errorf("could not parse error: %w", err)
  214. }
  215. if conv && aerr.StatusCode != 404 { // Secret is already deleted, nothing to do.
  216. return false, fmt.Errorf("unexpected api error: %w", err)
  217. }
  218. if aerr.StatusCode == 404 {
  219. return false, nil
  220. }
  221. manager, ok := tags["managed-by"]
  222. if !ok || manager == nil || *manager != managerLabel {
  223. return false, fmt.Errorf("not managed by external-secrets")
  224. }
  225. return true, nil
  226. }
  227. func (a *Azure) deleteKeyVaultKey(ctx context.Context, keyName string) error {
  228. value, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, keyName, "")
  229. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  230. ok, err := canDelete(value.Tags, err)
  231. if err != nil {
  232. return fmt.Errorf("error getting key %v: %w", keyName, err)
  233. }
  234. if ok {
  235. _, err = a.baseClient.DeleteKey(ctx, *a.provider.VaultURL, keyName)
  236. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteKey, err)
  237. if err != nil {
  238. return fmt.Errorf("error deleting key %v: %w", keyName, err)
  239. }
  240. }
  241. return nil
  242. }
  243. func (a *Azure) deleteKeyVaultSecret(ctx context.Context, secretName string) error {
  244. value, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  245. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  246. ok, err := canDelete(value.Tags, err)
  247. if err != nil {
  248. return fmt.Errorf("error getting secret %v: %w", secretName, err)
  249. }
  250. if ok {
  251. _, err = a.baseClient.DeleteSecret(ctx, *a.provider.VaultURL, secretName)
  252. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteSecret, err)
  253. if err != nil {
  254. return fmt.Errorf("error deleting secret %v: %w", secretName, err)
  255. }
  256. }
  257. return nil
  258. }
  259. func (a *Azure) deleteKeyVaultCertificate(ctx context.Context, certName string) error {
  260. value, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, certName, "")
  261. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  262. ok, err := canDelete(value.Tags, err)
  263. if err != nil {
  264. return fmt.Errorf("error getting certificate %v: %w", certName, err)
  265. }
  266. if ok {
  267. _, err = a.baseClient.DeleteCertificate(ctx, *a.provider.VaultURL, certName)
  268. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVDeleteCertificate, err)
  269. if err != nil {
  270. return fmt.Errorf("error deleting certificate %v: %w", certName, err)
  271. }
  272. }
  273. return nil
  274. }
  275. func (a *Azure) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  276. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: remoteRef.GetRemoteKey()})
  277. switch objectType {
  278. case defaultObjType:
  279. return a.deleteKeyVaultSecret(ctx, secretName)
  280. case objectTypeCert:
  281. return a.deleteKeyVaultCertificate(ctx, secretName)
  282. case objectTypeKey:
  283. return a.deleteKeyVaultKey(ctx, secretName)
  284. default:
  285. return fmt.Errorf("secret type '%v' is not supported", objectType)
  286. }
  287. }
  288. func (a *Azure) SecretExists(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) (bool, error) {
  289. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: remoteRef.GetRemoteKey()})
  290. var err error
  291. switch objectType {
  292. case defaultObjType:
  293. _, err = a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  294. case objectTypeCert:
  295. _, err = a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, "")
  296. case objectTypeKey:
  297. _, err = a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, "")
  298. default:
  299. errMsg := fmt.Sprintf("secret type '%v' is not supported", objectType)
  300. return false, errors.New(errMsg)
  301. }
  302. err = parseError(err)
  303. if err != nil {
  304. var noSecretErr esv1beta1.NoSecretError
  305. if errors.As(err, &noSecretErr) {
  306. return false, nil
  307. }
  308. return false, err
  309. }
  310. return true, nil
  311. }
  312. func getCertificateFromValue(value []byte) (*x509.Certificate, error) {
  313. // 1st: try decode pkcs12
  314. _, localCert, err := pkcs12.Decode(value, "")
  315. if err == nil {
  316. return localCert, nil
  317. }
  318. // 2nd: try DER
  319. localCert, err = x509.ParseCertificate(value)
  320. if err == nil {
  321. return localCert, nil
  322. }
  323. // 3nd: parse PEM blocks
  324. for {
  325. block, rest := pem.Decode(value)
  326. value = rest
  327. if block == nil {
  328. break
  329. }
  330. cert, err := x509.ParseCertificate(block.Bytes)
  331. if err == nil {
  332. return cert, nil
  333. }
  334. }
  335. return nil, fmt.Errorf("could not parse certificate value as PKCS#12, DER or PEM")
  336. }
  337. func getKeyFromValue(value []byte) (any, error) {
  338. val := value
  339. pemBlock, _ := pem.Decode(value)
  340. // if a private key regular expression doesn't match, we should consider this key to be symmetric
  341. if pemBlock == nil {
  342. return val, nil
  343. }
  344. val = pemBlock.Bytes
  345. switch pemBlock.Type {
  346. case "PRIVATE KEY":
  347. return x509.ParsePKCS8PrivateKey(val)
  348. case "RSA PRIVATE KEY":
  349. return x509.ParsePKCS1PrivateKey(val)
  350. case "EC PRIVATE KEY":
  351. return x509.ParseECPrivateKey(val)
  352. default:
  353. return nil, fmt.Errorf("key type %v is not supported", pemBlock.Type)
  354. }
  355. }
  356. func canCreate(tags map[string]*string, err error) (bool, error) {
  357. aerr := &autorest.DetailedError{}
  358. conv := errors.As(err, aerr)
  359. if err != nil && !conv {
  360. return false, fmt.Errorf("could not parse error: %w", err)
  361. }
  362. if conv && aerr.StatusCode != 404 {
  363. return false, fmt.Errorf("unexpected api error: %w", err)
  364. }
  365. if err == nil {
  366. manager, ok := tags["managed-by"]
  367. if !ok || manager == nil || *manager != managerLabel {
  368. return false, fmt.Errorf("not managed by external-secrets")
  369. }
  370. }
  371. return true, nil
  372. }
  373. func (a *Azure) setKeyVaultSecret(ctx context.Context, secretName string, value []byte) error {
  374. secret, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  375. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  376. ok, err := canCreate(secret.Tags, err)
  377. if err != nil {
  378. return fmt.Errorf("cannot get secret %v: %w", secretName, err)
  379. }
  380. if !ok {
  381. return nil
  382. }
  383. val := string(value)
  384. if secret.Value != nil && val == *secret.Value {
  385. return nil
  386. }
  387. secretParams := keyvault.SecretSetParameters{
  388. Value: &val,
  389. Tags: map[string]*string{
  390. "managed-by": pointer.To(managerLabel),
  391. },
  392. SecretAttributes: &keyvault.SecretAttributes{
  393. Enabled: pointer.To(true),
  394. },
  395. }
  396. _, err = a.baseClient.SetSecret(ctx, *a.provider.VaultURL, secretName, secretParams)
  397. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  398. if err != nil {
  399. return fmt.Errorf("could not set secret %v: %w", secretName, err)
  400. }
  401. return nil
  402. }
  403. func (a *Azure) setKeyVaultCertificate(ctx context.Context, secretName string, value []byte) error {
  404. val := b64.StdEncoding.EncodeToString(value)
  405. localCert, err := getCertificateFromValue(value)
  406. if err != nil {
  407. return fmt.Errorf("value from secret is not a valid certificate: %w", err)
  408. }
  409. cert, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, "")
  410. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  411. ok, err := canCreate(cert.Tags, err)
  412. if err != nil {
  413. return fmt.Errorf("cannot get certificate %v: %w", secretName, err)
  414. }
  415. if !ok {
  416. return nil
  417. }
  418. b512 := sha3.Sum512(localCert.Raw)
  419. if cert.Cer != nil && b512 == sha3.Sum512(*cert.Cer) {
  420. return nil
  421. }
  422. params := keyvault.CertificateImportParameters{
  423. Base64EncodedCertificate: &val,
  424. Tags: map[string]*string{
  425. "managed-by": pointer.To(managerLabel),
  426. },
  427. }
  428. _, err = a.baseClient.ImportCertificate(ctx, *a.provider.VaultURL, secretName, params)
  429. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVImportCertificate, err)
  430. if err != nil {
  431. return fmt.Errorf("could not import certificate %v: %w", secretName, err)
  432. }
  433. return nil
  434. }
  435. func equalKeys(newKey, oldKey keyvault.JSONWebKey) bool {
  436. // checks for everything except KeyID and KeyOps
  437. rsaCheck := newKey.E != nil && oldKey.E != nil && *newKey.E == *oldKey.E &&
  438. newKey.N != nil && oldKey.N != nil && *newKey.N == *oldKey.N
  439. symmetricCheck := newKey.Crv == oldKey.Crv &&
  440. newKey.T != nil && oldKey.T != nil && *newKey.T == *oldKey.T &&
  441. newKey.X != nil && oldKey.X != nil && *newKey.X == *oldKey.X &&
  442. newKey.Y != nil && oldKey.Y != nil && *newKey.Y == *oldKey.Y
  443. return newKey.Kty == oldKey.Kty && (rsaCheck || symmetricCheck)
  444. }
  445. func (a *Azure) setKeyVaultKey(ctx context.Context, secretName string, value []byte) error {
  446. key, err := getKeyFromValue(value)
  447. if err != nil {
  448. return fmt.Errorf("could not load private key %v: %w", secretName, err)
  449. }
  450. jwKey, err := jwk.FromRaw(key)
  451. if err != nil {
  452. return fmt.Errorf("failed to generate a JWK from secret %v content: %w", secretName, err)
  453. }
  454. buf, err := json.Marshal(jwKey)
  455. if err != nil {
  456. return fmt.Errorf("error parsing key: %w", err)
  457. }
  458. azkey := keyvault.JSONWebKey{}
  459. err = json.Unmarshal(buf, &azkey)
  460. if err != nil {
  461. return fmt.Errorf("error unmarshalling key: %w", err)
  462. }
  463. keyFromVault, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, "")
  464. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  465. ok, err := canCreate(keyFromVault.Tags, err)
  466. if err != nil {
  467. return fmt.Errorf("cannot get key %v: %w", secretName, err)
  468. }
  469. if !ok {
  470. return nil
  471. }
  472. if keyFromVault.Key != nil && equalKeys(azkey, *keyFromVault.Key) {
  473. return nil
  474. }
  475. params := keyvault.KeyImportParameters{
  476. Key: &azkey,
  477. KeyAttributes: &keyvault.KeyAttributes{},
  478. Tags: map[string]*string{
  479. "managed-by": pointer.To(managerLabel),
  480. },
  481. }
  482. _, err = a.baseClient.ImportKey(ctx, *a.provider.VaultURL, secretName, params)
  483. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVImportKey, err)
  484. if err != nil {
  485. return fmt.Errorf("could not import key %v: %w", secretName, err)
  486. }
  487. return nil
  488. }
  489. // PushSecret stores secrets into a Key vault instance.
  490. func (a *Azure) PushSecret(ctx context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  491. if data.GetSecretKey() == "" {
  492. return fmt.Errorf("pushing the whole secret is not yet implemented")
  493. }
  494. objectType, secretName := getObjType(esv1beta1.ExternalSecretDataRemoteRef{Key: data.GetRemoteKey()})
  495. value := secret.Data[data.GetSecretKey()]
  496. switch objectType {
  497. case defaultObjType:
  498. return a.setKeyVaultSecret(ctx, secretName, value)
  499. case objectTypeCert:
  500. return a.setKeyVaultCertificate(ctx, secretName, value)
  501. case objectTypeKey:
  502. return a.setKeyVaultKey(ctx, secretName, value)
  503. default:
  504. return fmt.Errorf("secret type %v not supported", objectType)
  505. }
  506. }
  507. // Implements store.Client.GetAllSecrets Interface.
  508. // Retrieves a map[string][]byte with the secret names as key and the secret itself as the calue.
  509. func (a *Azure) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  510. basicClient := a.baseClient
  511. secretsMap := make(map[string][]byte)
  512. checkTags := len(ref.Tags) > 0
  513. checkName := ref.Name != nil && ref.Name.RegExp != ""
  514. secretListIter, err := basicClient.GetSecretsComplete(ctx, *a.provider.VaultURL, nil)
  515. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecrets, err)
  516. err = parseError(err)
  517. if err != nil {
  518. return nil, err
  519. }
  520. for secretListIter.NotDone() {
  521. secret := secretListIter.Value()
  522. ok, secretName := isValidSecret(checkTags, checkName, ref, secret)
  523. if !ok {
  524. err = secretListIter.Next()
  525. if err != nil {
  526. return nil, err
  527. }
  528. continue
  529. }
  530. secretResp, err := basicClient.GetSecret(ctx, *a.provider.VaultURL, secretName, "")
  531. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  532. err = parseError(err)
  533. if err != nil {
  534. return nil, err
  535. }
  536. secretValue := *secretResp.Value
  537. secretsMap[secretName] = []byte(secretValue)
  538. err = secretListIter.Next()
  539. if err != nil {
  540. return nil, err
  541. }
  542. }
  543. return secretsMap, nil
  544. }
  545. // Retrieves a tag value if specified and all tags in JSON format if not.
  546. func getSecretTag(tags map[string]*string, property string) ([]byte, error) {
  547. if property == "" {
  548. secretTagsData := make(map[string]string)
  549. for k, v := range tags {
  550. secretTagsData[k] = *v
  551. }
  552. return json.Marshal(secretTagsData)
  553. }
  554. if val, exist := tags[property]; exist {
  555. return []byte(*val), nil
  556. }
  557. idx := strings.Index(property, ".")
  558. if idx < 0 {
  559. return nil, fmt.Errorf(errTagNotExist, property)
  560. }
  561. if idx > 0 {
  562. tagName := property[0:idx]
  563. if val, exist := tags[tagName]; exist {
  564. key := strings.Replace(property, tagName+".", "", 1)
  565. return getProperty(*val, key, property)
  566. }
  567. }
  568. return nil, fmt.Errorf(errTagNotExist, property)
  569. }
  570. // Retrieves a property value if specified and the secret value if not.
  571. func getProperty(secret, property, key string) ([]byte, error) {
  572. if property == "" {
  573. return []byte(secret), nil
  574. }
  575. res := gjson.Get(secret, property)
  576. if !res.Exists() {
  577. idx := strings.Index(property, ".")
  578. if idx < 0 {
  579. return nil, fmt.Errorf(errPropNotExist, property, key)
  580. }
  581. escaped := strings.ReplaceAll(property, ".", "\\.")
  582. jValue := gjson.Get(secret, escaped)
  583. if jValue.Exists() {
  584. return []byte(jValue.String()), nil
  585. }
  586. return nil, fmt.Errorf(errPropNotExist, property, key)
  587. }
  588. return []byte(res.String()), nil
  589. }
  590. func parseError(err error) error {
  591. aerr := autorest.DetailedError{}
  592. if errors.As(err, &aerr) && aerr.StatusCode == 404 {
  593. return esv1beta1.NoSecretError{}
  594. }
  595. return err
  596. }
  597. // Implements store.Client.GetSecret Interface.
  598. // Retrieves a secret/Key/Certificate/Tag with the secret name defined in ref.Name
  599. // The Object Type is defined as a prefix in the ref.Name , if no prefix is defined , we assume a secret is required.
  600. func (a *Azure) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  601. objectType, secretName := getObjType(ref)
  602. switch objectType {
  603. case defaultObjType:
  604. // returns a SecretBundle with the secret value
  605. // https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#SecretBundle
  606. secretResp, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, ref.Version)
  607. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  608. err = parseError(err)
  609. if err != nil {
  610. return nil, err
  611. }
  612. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  613. return getSecretTag(secretResp.Tags, ref.Property)
  614. }
  615. return getProperty(*secretResp.Value, ref.Property, ref.Key)
  616. case objectTypeCert:
  617. // returns a CertBundle. We return CER contents of x509 certificate
  618. // see: https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#CertificateBundle
  619. certResp, err := a.baseClient.GetCertificate(ctx, *a.provider.VaultURL, secretName, ref.Version)
  620. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetCertificate, err)
  621. err = parseError(err)
  622. if err != nil {
  623. return nil, err
  624. }
  625. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  626. return getSecretTag(certResp.Tags, ref.Property)
  627. }
  628. return *certResp.Cer, nil
  629. case objectTypeKey:
  630. // returns a KeyBundle that contains a jwk
  631. // azure kv returns only public keys
  632. // see: https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/services/keyvault/v7.0/keyvault#KeyBundle
  633. keyResp, err := a.baseClient.GetKey(ctx, *a.provider.VaultURL, secretName, ref.Version)
  634. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetKey, err)
  635. err = parseError(err)
  636. if err != nil {
  637. return nil, err
  638. }
  639. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  640. return getSecretTag(keyResp.Tags, ref.Property)
  641. }
  642. return json.Marshal(keyResp.Key)
  643. }
  644. return nil, fmt.Errorf(errUnknownObjectType, secretName)
  645. }
  646. // returns a SecretBundle with the tags values.
  647. func (a *Azure) getSecretTags(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string]*string, error) {
  648. _, secretName := getObjType(ref)
  649. secretResp, err := a.baseClient.GetSecret(ctx, *a.provider.VaultURL, secretName, ref.Version)
  650. metrics.ObserveAPICall(constants.ProviderAzureKV, constants.CallAzureKVGetSecret, err)
  651. err = parseError(err)
  652. if err != nil {
  653. return nil, err
  654. }
  655. secretTagsData := make(map[string]*string)
  656. for tagname, tagval := range secretResp.Tags {
  657. name := secretName + "_" + tagname
  658. kv := make(map[string]string)
  659. err = json.Unmarshal([]byte(*tagval), &kv)
  660. // if the tagvalue is not in JSON format then we added to secretTagsData we added as it is
  661. if err != nil {
  662. secretTagsData[name] = tagval
  663. } else {
  664. for k, v := range kv {
  665. value := v
  666. secretTagsData[name+"_"+k] = &value
  667. }
  668. }
  669. }
  670. return secretTagsData, nil
  671. }
  672. // Implements store.Client.GetSecretMap Interface.
  673. // New version of GetSecretMap.
  674. func (a *Azure) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  675. objectType, secretName := getObjType(ref)
  676. switch objectType {
  677. case defaultObjType:
  678. data, err := a.GetSecret(ctx, ref)
  679. if err != nil {
  680. return nil, err
  681. }
  682. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  683. tags, _ := a.getSecretTags(ctx, ref)
  684. return getSecretMapProperties(tags, ref.Key, ref.Property), nil
  685. }
  686. return getSecretMapMap(data)
  687. case objectTypeCert:
  688. return nil, fmt.Errorf(errDataFromCert)
  689. case objectTypeKey:
  690. return nil, fmt.Errorf(errDataFromKey)
  691. }
  692. return nil, fmt.Errorf(errUnknownObjectType, secretName)
  693. }
  694. func getSecretMapMap(data []byte) (map[string][]byte, error) {
  695. kv := make(map[string]json.RawMessage)
  696. err := json.Unmarshal(data, &kv)
  697. if err != nil {
  698. return nil, fmt.Errorf(errUnmarshalJSONData, err)
  699. }
  700. secretData := make(map[string][]byte)
  701. for k, v := range kv {
  702. var strVal string
  703. err = json.Unmarshal(v, &strVal)
  704. if err == nil {
  705. secretData[k] = []byte(strVal)
  706. } else {
  707. secretData[k] = v
  708. }
  709. }
  710. return secretData, nil
  711. }
  712. func getSecretMapProperties(tags map[string]*string, key, property string) map[string][]byte {
  713. tagByteArray := make(map[string][]byte)
  714. if property != "" {
  715. keyPropertyName := key + "_" + property
  716. singleTag, _ := getSecretTag(tags, keyPropertyName)
  717. tagByteArray[keyPropertyName] = singleTag
  718. return tagByteArray
  719. }
  720. for k, v := range tags {
  721. tagByteArray[k] = []byte(*v)
  722. }
  723. return tagByteArray
  724. }
  725. func (a *Azure) authorizerForWorkloadIdentity(ctx context.Context, tokenProvider tokenProviderFunc) (autorest.Authorizer, error) {
  726. aadEndpoint := AadEndpointForType(a.provider.EnvironmentType)
  727. kvResource := kvResourceForProviderConfig(a.provider.EnvironmentType)
  728. // If no serviceAccountRef was provided
  729. // we expect certain env vars to be present.
  730. // They are set by the azure workload identity webhook
  731. // by adding the label `azure.workload.identity/use: "true"` to the external-secrets pod
  732. if a.provider.ServiceAccountRef == nil {
  733. clientID := os.Getenv("AZURE_CLIENT_ID")
  734. tenantID := os.Getenv("AZURE_TENANT_ID")
  735. tokenFilePath := os.Getenv("AZURE_FEDERATED_TOKEN_FILE")
  736. if clientID == "" || tenantID == "" || tokenFilePath == "" {
  737. return nil, errors.New(errMissingWorkloadEnvVars)
  738. }
  739. token, err := os.ReadFile(tokenFilePath)
  740. if err != nil {
  741. return nil, fmt.Errorf(errReadTokenFile, tokenFilePath, err)
  742. }
  743. tp, err := tokenProvider(ctx, string(token), clientID, tenantID, aadEndpoint, kvResource)
  744. if err != nil {
  745. return nil, err
  746. }
  747. return autorest.NewBearerAuthorizer(tp), nil
  748. }
  749. ns := a.namespace
  750. if a.store.GetKind() == esv1beta1.ClusterSecretStoreKind && a.provider.ServiceAccountRef.Namespace != nil {
  751. ns = *a.provider.ServiceAccountRef.Namespace
  752. }
  753. var sa corev1.ServiceAccount
  754. err := a.crClient.Get(ctx, types.NamespacedName{
  755. Name: a.provider.ServiceAccountRef.Name,
  756. Namespace: ns,
  757. }, &sa)
  758. if err != nil {
  759. return nil, err
  760. }
  761. // Extract clientID
  762. var clientID string
  763. // First check if AuthSecretRef is set and clientID can be fetched from there
  764. if a.provider.AuthSecretRef != nil {
  765. if a.provider.AuthSecretRef.ClientID == nil {
  766. return nil, fmt.Errorf(errMissingClientIDSecret)
  767. }
  768. clientID, err = resolvers.SecretKeyRef(
  769. ctx,
  770. a.crClient,
  771. a.store.GetKind(),
  772. a.namespace, a.provider.AuthSecretRef.ClientID)
  773. if err != nil {
  774. return nil, err
  775. }
  776. }
  777. // If AuthSecretRef is not set, use default (Service Account) implementation
  778. // Try to get clientID from Annotations
  779. if len(sa.ObjectMeta.Annotations) > 0 {
  780. if val, found := sa.ObjectMeta.Annotations[AnnotationClientID]; found {
  781. // If clientID is defined in both Annotations and AuthSecretRef, return an error
  782. if clientID != "" {
  783. return nil, fmt.Errorf(errMultipleClientID)
  784. }
  785. clientID = val
  786. }
  787. }
  788. // Return an error if clientID is still empty
  789. if clientID == "" {
  790. return nil, fmt.Errorf(errMissingClient, AnnotationClientID)
  791. }
  792. // Extract tenantID
  793. var tenantID string
  794. // First check if AuthSecretRef is set and tenantID can be fetched from there
  795. if a.provider.AuthSecretRef != nil {
  796. // We may want to set tenantID explicitly in the `spec.provider.azurekv` section of the SecretStore object
  797. // So that is okay if it is not there
  798. if a.provider.AuthSecretRef.TenantID != nil {
  799. tenantID, err = resolvers.SecretKeyRef(
  800. ctx,
  801. a.crClient,
  802. a.store.GetKind(),
  803. a.namespace, a.provider.AuthSecretRef.TenantID)
  804. if err != nil {
  805. return nil, err
  806. }
  807. }
  808. }
  809. // Check if spec.provider.azurekv.tenantID is set
  810. if tenantID == "" && a.provider.TenantID != nil {
  811. tenantID = *a.provider.TenantID
  812. }
  813. // Try to get tenantID from Annotations first. Default implementation.
  814. if len(sa.ObjectMeta.Annotations) > 0 {
  815. if val, found := sa.ObjectMeta.Annotations[AnnotationTenantID]; found {
  816. // If tenantID is defined in both Annotations and AuthSecretRef, return an error
  817. if tenantID != "" {
  818. return nil, fmt.Errorf(errMultipleTenantID)
  819. }
  820. tenantID = val
  821. }
  822. }
  823. // Fallback: use the AZURE_TENANT_ID env var which is set by the azure workload identity webhook
  824. // https://azure.github.io/azure-workload-identity/docs/topics/service-account-labels-and-annotations.html#service-account
  825. if tenantID == "" {
  826. tenantID = os.Getenv("AZURE_TENANT_ID")
  827. }
  828. // Return an error if tenantID is still empty
  829. if tenantID == "" {
  830. return nil, errors.New(errMissingTenant)
  831. }
  832. audiences := []string{AzureDefaultAudience}
  833. if len(a.provider.ServiceAccountRef.Audiences) > 0 {
  834. audiences = append(audiences, a.provider.ServiceAccountRef.Audiences...)
  835. }
  836. token, err := FetchSAToken(ctx, ns, a.provider.ServiceAccountRef.Name, audiences, a.kubeClient)
  837. if err != nil {
  838. return nil, err
  839. }
  840. tp, err := tokenProvider(ctx, token, clientID, tenantID, aadEndpoint, kvResource)
  841. if err != nil {
  842. return nil, err
  843. }
  844. return autorest.NewBearerAuthorizer(tp), nil
  845. }
  846. func FetchSAToken(ctx context.Context, ns, name string, audiences []string, kubeClient kcorev1.CoreV1Interface) (string, error) {
  847. token, err := kubeClient.ServiceAccounts(ns).CreateToken(ctx, name, &authv1.TokenRequest{
  848. Spec: authv1.TokenRequestSpec{
  849. Audiences: audiences,
  850. },
  851. }, metav1.CreateOptions{})
  852. if err != nil {
  853. return "", err
  854. }
  855. return token.Status.Token, nil
  856. }
  857. // tokenProvider satisfies the adal.OAuthTokenProvider interface.
  858. type tokenProvider struct {
  859. accessToken string
  860. }
  861. type tokenProviderFunc func(ctx context.Context, token, clientID, tenantID, aadEndpoint, kvResource string) (adal.OAuthTokenProvider, error)
  862. func NewTokenProvider(ctx context.Context, token, clientID, tenantID, aadEndpoint, kvResource string) (adal.OAuthTokenProvider, error) {
  863. // exchange token with Azure AccessToken
  864. cred := confidential.NewCredFromAssertionCallback(func(ctx context.Context, aro confidential.AssertionRequestOptions) (string, error) {
  865. return token, nil
  866. })
  867. cClient, err := confidential.New(fmt.Sprintf("%s%s/oauth2/token", aadEndpoint, tenantID), clientID, cred)
  868. if err != nil {
  869. return nil, err
  870. }
  871. scope := kvResource
  872. // .default needs to be added to the scope
  873. if !strings.Contains(kvResource, ".default") {
  874. scope = fmt.Sprintf("%s/.default", kvResource)
  875. }
  876. authRes, err := cClient.AcquireTokenByCredential(ctx, []string{
  877. scope,
  878. })
  879. if err != nil {
  880. return nil, err
  881. }
  882. return &tokenProvider{
  883. accessToken: authRes.AccessToken,
  884. }, nil
  885. }
  886. func (t *tokenProvider) OAuthToken() string {
  887. return t.accessToken
  888. }
  889. func (a *Azure) authorizerForManagedIdentity() (autorest.Authorizer, error) {
  890. msiConfig := kvauth.NewMSIConfig()
  891. msiConfig.Resource = kvResourceForProviderConfig(a.provider.EnvironmentType)
  892. if a.provider.IdentityID != nil {
  893. msiConfig.ClientID = *a.provider.IdentityID
  894. }
  895. return msiConfig.Authorizer()
  896. }
  897. func (a *Azure) authorizerForServicePrincipal(ctx context.Context) (autorest.Authorizer, error) {
  898. if a.provider.TenantID == nil {
  899. return nil, fmt.Errorf(errMissingTenant)
  900. }
  901. if a.provider.AuthSecretRef == nil {
  902. return nil, fmt.Errorf(errMissingSecretRef)
  903. }
  904. if a.provider.AuthSecretRef.ClientID == nil || (a.provider.AuthSecretRef.ClientSecret == nil && a.provider.AuthSecretRef.ClientCertificate == nil) {
  905. return nil, fmt.Errorf(errMissingClientIDSecret)
  906. }
  907. if a.provider.AuthSecretRef.ClientSecret != nil && a.provider.AuthSecretRef.ClientCertificate != nil {
  908. return nil, fmt.Errorf(errInvalidClientCredentials)
  909. }
  910. return a.getAuthorizerFromCredentials(ctx)
  911. }
  912. func (a *Azure) getAuthorizerFromCredentials(ctx context.Context) (autorest.Authorizer, error) {
  913. clientID, err := resolvers.SecretKeyRef(
  914. ctx,
  915. a.crClient,
  916. a.store.GetKind(),
  917. a.namespace, a.provider.AuthSecretRef.ClientID,
  918. )
  919. if err != nil {
  920. return nil, err
  921. }
  922. if a.provider.AuthSecretRef.ClientSecret != nil {
  923. clientSecret, err := resolvers.SecretKeyRef(
  924. ctx,
  925. a.crClient,
  926. a.store.GetKind(),
  927. a.namespace, a.provider.AuthSecretRef.ClientSecret,
  928. )
  929. if err != nil {
  930. return nil, err
  931. }
  932. return getAuthorizerForClientSecret(
  933. clientID,
  934. clientSecret,
  935. *a.provider.TenantID,
  936. a.provider.EnvironmentType,
  937. )
  938. } else {
  939. clientCertificate, err := resolvers.SecretKeyRef(
  940. ctx,
  941. a.crClient,
  942. a.store.GetKind(),
  943. a.namespace, a.provider.AuthSecretRef.ClientCertificate,
  944. )
  945. if err != nil {
  946. return nil, err
  947. }
  948. return getAuthorizerForClientCertificate(
  949. clientID,
  950. []byte(clientCertificate),
  951. *a.provider.TenantID,
  952. a.provider.EnvironmentType,
  953. )
  954. }
  955. }
  956. func getAuthorizerForClientSecret(clientID, clientSecret, tenantID string, environmentType esv1beta1.AzureEnvironmentType) (autorest.Authorizer, error) {
  957. clientCredentialsConfig := kvauth.NewClientCredentialsConfig(clientID, clientSecret, tenantID)
  958. clientCredentialsConfig.Resource = kvResourceForProviderConfig(environmentType)
  959. clientCredentialsConfig.AADEndpoint = AadEndpointForType(environmentType)
  960. return clientCredentialsConfig.Authorizer()
  961. }
  962. func getAuthorizerForClientCertificate(clientID string, certificateBytes []byte, tenantID string, environmentType esv1beta1.AzureEnvironmentType) (autorest.Authorizer, error) {
  963. clientCertificateConfig := NewClientInMemoryCertificateConfig(clientID, certificateBytes, tenantID)
  964. clientCertificateConfig.Resource = kvResourceForProviderConfig(environmentType)
  965. clientCertificateConfig.AADEndpoint = AadEndpointForType(environmentType)
  966. return clientCertificateConfig.Authorizer()
  967. }
  968. func (a *Azure) Close(_ context.Context) error {
  969. return nil
  970. }
  971. func (a *Azure) Validate() (esv1beta1.ValidationResult, error) {
  972. if a.store.GetKind() == esv1beta1.ClusterSecretStoreKind && isReferentSpec(a.provider) {
  973. return esv1beta1.ValidationResultUnknown, nil
  974. }
  975. return esv1beta1.ValidationResultReady, nil
  976. }
  977. func isReferentSpec(prov *esv1beta1.AzureKVProvider) bool {
  978. if prov.AuthSecretRef != nil &&
  979. ((prov.AuthSecretRef.ClientID != nil &&
  980. prov.AuthSecretRef.ClientID.Namespace == nil) ||
  981. (prov.AuthSecretRef.ClientSecret != nil &&
  982. prov.AuthSecretRef.ClientSecret.Namespace == nil)) {
  983. return true
  984. }
  985. if prov.ServiceAccountRef != nil &&
  986. prov.ServiceAccountRef.Namespace == nil {
  987. return true
  988. }
  989. return false
  990. }
  991. func AadEndpointForType(t esv1beta1.AzureEnvironmentType) string {
  992. switch t {
  993. case esv1beta1.AzureEnvironmentPublicCloud:
  994. return azure.PublicCloud.ActiveDirectoryEndpoint
  995. case esv1beta1.AzureEnvironmentChinaCloud:
  996. return azure.ChinaCloud.ActiveDirectoryEndpoint
  997. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  998. return azure.USGovernmentCloud.ActiveDirectoryEndpoint
  999. case esv1beta1.AzureEnvironmentGermanCloud:
  1000. return azure.GermanCloud.ActiveDirectoryEndpoint
  1001. default:
  1002. return azure.PublicCloud.ActiveDirectoryEndpoint
  1003. }
  1004. }
  1005. func ServiceManagementEndpointForType(t esv1beta1.AzureEnvironmentType) string {
  1006. switch t {
  1007. case esv1beta1.AzureEnvironmentPublicCloud:
  1008. return azure.PublicCloud.ServiceManagementEndpoint
  1009. case esv1beta1.AzureEnvironmentChinaCloud:
  1010. return azure.ChinaCloud.ServiceManagementEndpoint
  1011. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  1012. return azure.USGovernmentCloud.ServiceManagementEndpoint
  1013. case esv1beta1.AzureEnvironmentGermanCloud:
  1014. return azure.GermanCloud.ServiceManagementEndpoint
  1015. default:
  1016. return azure.PublicCloud.ServiceManagementEndpoint
  1017. }
  1018. }
  1019. func kvResourceForProviderConfig(t esv1beta1.AzureEnvironmentType) string {
  1020. var res string
  1021. switch t {
  1022. case esv1beta1.AzureEnvironmentPublicCloud:
  1023. res = azure.PublicCloud.KeyVaultEndpoint
  1024. case esv1beta1.AzureEnvironmentChinaCloud:
  1025. res = azure.ChinaCloud.KeyVaultEndpoint
  1026. case esv1beta1.AzureEnvironmentUSGovernmentCloud:
  1027. res = azure.USGovernmentCloud.KeyVaultEndpoint
  1028. case esv1beta1.AzureEnvironmentGermanCloud:
  1029. res = azure.GermanCloud.KeyVaultEndpoint
  1030. default:
  1031. res = azure.PublicCloud.KeyVaultEndpoint
  1032. }
  1033. return strings.TrimSuffix(res, "/")
  1034. }
  1035. func getObjType(ref esv1beta1.ExternalSecretDataRemoteRef) (string, string) {
  1036. objectType := defaultObjType
  1037. secretName := ref.Key
  1038. nameSplitted := strings.Split(secretName, "/")
  1039. if len(nameSplitted) > 1 {
  1040. objectType = nameSplitted[0]
  1041. secretName = nameSplitted[1]
  1042. // TODO: later tokens can be used to read the secret tags
  1043. }
  1044. return objectType, secretName
  1045. }
  1046. func isValidSecret(checkTags, checkName bool, ref esv1beta1.ExternalSecretFind, secret keyvault.SecretItem) (bool, string) {
  1047. if secret.ID == nil || !*secret.Attributes.Enabled {
  1048. return false, ""
  1049. }
  1050. if checkTags && !okByTags(ref, secret) {
  1051. return false, ""
  1052. }
  1053. secretName := path.Base(*secret.ID)
  1054. if checkName && !okByName(ref, secretName) {
  1055. return false, ""
  1056. }
  1057. return true, secretName
  1058. }
  1059. func okByName(ref esv1beta1.ExternalSecretFind, secretName string) bool {
  1060. matches, _ := regexp.MatchString(ref.Name.RegExp, secretName)
  1061. return matches
  1062. }
  1063. func okByTags(ref esv1beta1.ExternalSecretFind, secret keyvault.SecretItem) bool {
  1064. tagsFound := true
  1065. for k, v := range ref.Tags {
  1066. if val, ok := secret.Tags[k]; !ok || *val != v {
  1067. tagsFound = false
  1068. break
  1069. }
  1070. }
  1071. return tagsFound
  1072. }