provider.go 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "time"
  18. vault "github.com/hashicorp/vault/api"
  19. "github.com/spf13/pflag"
  20. "k8s.io/client-go/kubernetes"
  21. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  22. ctrl "sigs.k8s.io/controller-runtime"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  25. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  26. "github.com/external-secrets/external-secrets/pkg/cache"
  27. "github.com/external-secrets/external-secrets/pkg/feature"
  28. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  29. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  30. )
  31. var (
  32. _ esv1beta1.Provider = &Provider{}
  33. enableCache bool
  34. logger = ctrl.Log.WithName("provider").WithName("vault")
  35. clientCache *cache.Cache[util.Client]
  36. )
  37. const (
  38. errVaultStore = "received invalid Vault SecretStore resource: %w"
  39. errVaultClient = "cannot setup new vault client: %w"
  40. errVaultCert = "cannot set Vault CA certificate: %w"
  41. errConfigMapFmt = "cannot find config map data for key: %q"
  42. errClientTLSAuth = "error from Client TLS Auth: %q"
  43. errUnknownCAProvider = "unknown caProvider type given"
  44. errCANamespace = "cannot read secret for CAProvider due to missing namespace on kind ClusterSecretStore"
  45. )
  46. type Provider struct {
  47. // NewVaultClient is a function that returns a new Vault client.
  48. // This is used for testing to inject a fake client.
  49. NewVaultClient func(config *vault.Config) (util.Client, error)
  50. }
  51. // NewVaultClient returns a new Vault client.
  52. func NewVaultClient(config *vault.Config) (util.Client, error) {
  53. vaultClient, err := vault.NewClient(config)
  54. if err != nil {
  55. return nil, err
  56. }
  57. return &util.VaultClient{
  58. SetTokenFunc: vaultClient.SetToken,
  59. TokenFunc: vaultClient.Token,
  60. ClearTokenFunc: vaultClient.ClearToken,
  61. AuthField: vaultClient.Auth(),
  62. AuthTokenField: vaultClient.Auth().Token(),
  63. LogicalField: vaultClient.Logical(),
  64. NamespaceFunc: vaultClient.Namespace,
  65. SetNamespaceFunc: vaultClient.SetNamespace,
  66. AddHeaderFunc: vaultClient.AddHeader,
  67. }, nil
  68. }
  69. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  70. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  71. return esv1beta1.SecretStoreReadWrite
  72. }
  73. // NewClient implements the Client interface.
  74. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  75. // controller-runtime/client does not support TokenRequest or other subresource APIs
  76. // so we need to construct our own client and use it to fetch tokens
  77. // (for Kubernetes service account token auth)
  78. restCfg, err := ctrlcfg.GetConfig()
  79. if err != nil {
  80. return nil, err
  81. }
  82. clientset, err := kubernetes.NewForConfig(restCfg)
  83. if err != nil {
  84. return nil, err
  85. }
  86. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  87. }
  88. func (p *Provider) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, namespace string) (util.Client, error) {
  89. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, nil, namespace, resolvers.EmptyStoreKind)
  90. if err != nil {
  91. return nil, err
  92. }
  93. client, err := p.NewVaultClient(cfg)
  94. if err != nil {
  95. return nil, err
  96. }
  97. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  98. if err != nil {
  99. return nil, err
  100. }
  101. return client, nil
  102. }
  103. func (p *Provider) newClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  104. storeSpec := store.GetSpec()
  105. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  106. return nil, errors.New(errVaultStore)
  107. }
  108. vaultSpec := storeSpec.Provider.Vault
  109. vStore, cfg, err := p.prepareConfig(
  110. ctx,
  111. kube,
  112. corev1,
  113. vaultSpec,
  114. storeSpec.RetrySettings,
  115. namespace,
  116. store.GetObjectKind().GroupVersionKind().Kind)
  117. if err != nil {
  118. return nil, err
  119. }
  120. client, err := getVaultClient(p, store, cfg)
  121. if err != nil {
  122. return nil, fmt.Errorf(errVaultClient, err)
  123. }
  124. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  125. }
  126. func (p *Provider) initClient(ctx context.Context, c *client, client util.Client, cfg *vault.Config, vaultSpec *esv1beta1.VaultProvider) (esv1beta1.SecretsClient, error) {
  127. if vaultSpec.Namespace != nil {
  128. client.SetNamespace(*vaultSpec.Namespace)
  129. }
  130. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  131. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  132. }
  133. c.client = client
  134. c.auth = client.Auth()
  135. c.logical = client.Logical()
  136. c.token = client.AuthToken()
  137. // allow SecretStore controller validation to pass
  138. // when using referent namespace.
  139. if c.storeKind == esv1beta1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  140. return c, nil
  141. }
  142. if err := c.setAuth(ctx, cfg); err != nil {
  143. return nil, err
  144. }
  145. return c, nil
  146. }
  147. func (p *Provider) prepareConfig(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, retrySettings *esv1beta1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  148. c := &client{
  149. kube: kube,
  150. corev1: corev1,
  151. store: vaultSpec,
  152. log: logger,
  153. namespace: namespace,
  154. storeKind: storeKind,
  155. }
  156. cfg, err := c.newConfig(ctx)
  157. if err != nil {
  158. return nil, nil, err
  159. }
  160. // Setup retry options if present
  161. if retrySettings != nil {
  162. if retrySettings.MaxRetries != nil {
  163. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  164. } else {
  165. // By default we rely only on the reconciliation process for retrying
  166. cfg.MaxRetries = 0
  167. }
  168. if retrySettings.RetryInterval != nil {
  169. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  170. if err != nil {
  171. return nil, nil, err
  172. }
  173. cfg.MinRetryWait = retryWait
  174. cfg.MaxRetryWait = retryWait
  175. }
  176. }
  177. return c, cfg, nil
  178. }
  179. func getVaultClient(p *Provider, store esv1beta1.GenericStore, cfg *vault.Config) (util.Client, error) {
  180. isStaticToken := store.GetSpec().Provider.Vault.Auth.TokenSecretRef != nil
  181. useCache := enableCache && !isStaticToken
  182. key := cache.Key{
  183. Name: store.GetObjectMeta().Name,
  184. Namespace: store.GetObjectMeta().Namespace,
  185. Kind: store.GetTypeMeta().Kind,
  186. }
  187. if useCache {
  188. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  189. if ok {
  190. return client, nil
  191. }
  192. }
  193. client, err := p.NewVaultClient(cfg)
  194. if err != nil {
  195. return nil, fmt.Errorf(errVaultClient, err)
  196. }
  197. if useCache && !clientCache.Contains(key) {
  198. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  199. }
  200. return client, nil
  201. }
  202. func isReferentSpec(prov *esv1beta1.VaultProvider) bool {
  203. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  204. return true
  205. }
  206. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  207. return true
  208. }
  209. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  210. return true
  211. }
  212. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  213. return true
  214. }
  215. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  216. return true
  217. }
  218. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  219. return true
  220. }
  221. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  222. return true
  223. }
  224. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  225. return true
  226. }
  227. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  228. return true
  229. }
  230. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  231. return true
  232. }
  233. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  234. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  235. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  236. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  237. return true
  238. }
  239. return false
  240. }
  241. func init() {
  242. var vaultTokenCacheSize int
  243. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  244. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  245. // max. 265k vault leases with 30bytes each ~= 7MB
  246. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", 2<<17, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  247. lateInit := func() {
  248. logger.Info("initializing vault cache", "size", vaultTokenCacheSize)
  249. clientCache = cache.Must(vaultTokenCacheSize, func(client util.Client) {
  250. err := revokeTokenIfValid(context.Background(), client)
  251. if err != nil {
  252. logger.Error(err, "unable to revoke cached token on eviction")
  253. }
  254. })
  255. }
  256. feature.Register(feature.Feature{
  257. Flags: fs,
  258. Initialize: lateInit,
  259. })
  260. esv1beta1.Register(&Provider{
  261. NewVaultClient: NewVaultClient,
  262. }, &esv1beta1.SecretStoreProvider{
  263. Vault: &esv1beta1.VaultProvider{},
  264. })
  265. }