auth.go 9.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package auth
  13. import (
  14. "context"
  15. "fmt"
  16. "github.com/aws/aws-sdk-go/aws"
  17. "github.com/aws/aws-sdk-go/aws/credentials"
  18. "github.com/aws/aws-sdk-go/aws/credentials/stscreds"
  19. "github.com/aws/aws-sdk-go/aws/defaults"
  20. "github.com/aws/aws-sdk-go/aws/request"
  21. "github.com/aws/aws-sdk-go/aws/session"
  22. "github.com/aws/aws-sdk-go/service/sts"
  23. "github.com/aws/aws-sdk-go/service/sts/stsiface"
  24. v1 "k8s.io/api/core/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. "k8s.io/client-go/kubernetes"
  27. ctrl "sigs.k8s.io/controller-runtime"
  28. "sigs.k8s.io/controller-runtime/pkg/client"
  29. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  30. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  31. "github.com/external-secrets/external-secrets/pkg/provider/aws/util"
  32. )
  33. // Config contains configuration to create a new AWS provider.
  34. type Config struct {
  35. AssumeRole string
  36. Region string
  37. APIRetries int
  38. }
  39. type SessionCache struct {
  40. Name string
  41. Namespace string
  42. Kind string
  43. ResourceVersion string
  44. }
  45. var (
  46. log = ctrl.Log.WithName("provider").WithName("aws")
  47. sessions = make(map[SessionCache]*session.Session)
  48. )
  49. const (
  50. roleARNAnnotation = "eks.amazonaws.com/role-arn"
  51. errInvalidClusterStoreMissingAKIDNamespace = "invalid ClusterSecretStore: missing AWS AccessKeyID Namespace"
  52. errInvalidClusterStoreMissingSAKNamespace = "invalid ClusterSecretStore: missing AWS SecretAccessKey Namespace"
  53. errFetchAKIDSecret = "could not fetch accessKeyID secret: %w"
  54. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  55. errMissingSAK = "missing SecretAccessKey"
  56. errMissingAKID = "missing AccessKeyID"
  57. )
  58. // New creates a new aws session based on the provided store
  59. // it uses the following authentication mechanisms in order:
  60. // * service-account token authentication via AssumeRoleWithWebIdentity
  61. // * static credentials from a Kind=Secret, optionally with doing a AssumeRole.
  62. // * sdk default provider chain, see: https://docs.aws.amazon.com/sdk-for-java/v1/developer-guide/credentials.html#credentials-default
  63. func New(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string, assumeRoler STSProvider, jwtProvider jwtProviderFactory) (*session.Session, error) {
  64. prov, err := util.GetAWSProvider(store)
  65. if err != nil {
  66. return nil, err
  67. }
  68. var creds *credentials.Credentials
  69. // use credentials via service account token
  70. jwtAuth := prov.Auth.JWTAuth
  71. if jwtAuth != nil {
  72. creds, err = sessionFromServiceAccount(ctx, prov, store, kube, namespace, jwtProvider)
  73. if err != nil {
  74. return nil, err
  75. }
  76. }
  77. // use credentials from sercretRef
  78. secretRef := prov.Auth.SecretRef
  79. if secretRef != nil {
  80. log.V(1).Info("using credentials from secretRef")
  81. creds, err = sessionFromSecretRef(ctx, prov, store, kube, namespace)
  82. if err != nil {
  83. return nil, err
  84. }
  85. }
  86. config := aws.NewConfig().WithEndpointResolver(ResolveEndpoint())
  87. if creds != nil {
  88. config.WithCredentials(creds)
  89. }
  90. if prov.Region != "" {
  91. config.WithRegion(prov.Region)
  92. }
  93. sess, err := getAWSSession(config, prov, store, namespace)
  94. if err != nil {
  95. return nil, err
  96. }
  97. if prov.Role != "" {
  98. stsclient := assumeRoler(sess)
  99. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, prov.Role))
  100. }
  101. log.Info("using aws session", "region", *sess.Config.Region, "credentials", creds)
  102. return sess, nil
  103. }
  104. func sessionFromSecretRef(ctx context.Context, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, kube client.Client, namespace string) (*credentials.Credentials, error) {
  105. ke := client.ObjectKey{
  106. Name: prov.Auth.SecretRef.AccessKeyID.Name,
  107. Namespace: namespace, // default to ExternalSecret namespace
  108. }
  109. // only ClusterStore is allowed to set namespace (and then it's required)
  110. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  111. if prov.Auth.SecretRef.AccessKeyID.Namespace == nil {
  112. return nil, fmt.Errorf(errInvalidClusterStoreMissingAKIDNamespace)
  113. }
  114. ke.Namespace = *prov.Auth.SecretRef.AccessKeyID.Namespace
  115. }
  116. akSecret := v1.Secret{}
  117. err := kube.Get(ctx, ke, &akSecret)
  118. if err != nil {
  119. return nil, fmt.Errorf(errFetchAKIDSecret, err)
  120. }
  121. ke = client.ObjectKey{
  122. Name: prov.Auth.SecretRef.SecretAccessKey.Name,
  123. Namespace: namespace, // default to ExternalSecret namespace
  124. }
  125. // only ClusterStore is allowed to set namespace (and then it's required)
  126. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  127. if prov.Auth.SecretRef.SecretAccessKey.Namespace == nil {
  128. return nil, fmt.Errorf(errInvalidClusterStoreMissingSAKNamespace)
  129. }
  130. ke.Namespace = *prov.Auth.SecretRef.SecretAccessKey.Namespace
  131. }
  132. sakSecret := v1.Secret{}
  133. err = kube.Get(ctx, ke, &sakSecret)
  134. if err != nil {
  135. return nil, fmt.Errorf(errFetchSAKSecret, err)
  136. }
  137. sak := string(sakSecret.Data[prov.Auth.SecretRef.SecretAccessKey.Key])
  138. aks := string(akSecret.Data[prov.Auth.SecretRef.AccessKeyID.Key])
  139. if sak == "" {
  140. return nil, fmt.Errorf(errMissingSAK)
  141. }
  142. if aks == "" {
  143. return nil, fmt.Errorf(errMissingAKID)
  144. }
  145. return credentials.NewStaticCredentials(aks, sak, ""), err
  146. }
  147. func sessionFromServiceAccount(ctx context.Context, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, kube client.Client, namespace string, jwtProvider jwtProviderFactory) (*credentials.Credentials, error) {
  148. if store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind {
  149. if prov.Auth.JWTAuth.ServiceAccountRef.Namespace == nil {
  150. return nil, fmt.Errorf("serviceAccountRef has no Namespace field (mandatory for ClusterSecretStore specs)")
  151. }
  152. namespace = *prov.Auth.JWTAuth.ServiceAccountRef.Namespace
  153. }
  154. name := prov.Auth.JWTAuth.ServiceAccountRef.Name
  155. sa := v1.ServiceAccount{}
  156. err := kube.Get(ctx, types.NamespacedName{
  157. Name: name,
  158. Namespace: namespace,
  159. }, &sa)
  160. if err != nil {
  161. return nil, err
  162. }
  163. // the service account is expected to have a well-known annotation
  164. // this is used as input to assumeRoleWithWebIdentity
  165. roleArn := sa.Annotations[roleARNAnnotation]
  166. if roleArn == "" {
  167. return nil, fmt.Errorf("an IAM role must be associated with service account %s (namespace: %s)", name, namespace)
  168. }
  169. jwtProv, err := jwtProvider(name, namespace, roleArn, prov.Region)
  170. if err != nil {
  171. return nil, err
  172. }
  173. log.V(1).Info("using credentials via service account", "role", roleArn, "region", prov.Region)
  174. return credentials.NewCredentials(jwtProv), nil
  175. }
  176. type jwtProviderFactory func(name, namespace, roleArn, region string) (credentials.Provider, error)
  177. // DefaultJWTProvider returns a credentials.Provider that calls the AssumeRoleWithWebidentity
  178. // controller-runtime/client does not support TokenRequest or other subresource APIs
  179. // so we need to construct our own client and use it to fetch tokens.
  180. func DefaultJWTProvider(name, namespace, roleArn, region string) (credentials.Provider, error) {
  181. cfg, err := ctrlcfg.GetConfig()
  182. if err != nil {
  183. return nil, err
  184. }
  185. clientset, err := kubernetes.NewForConfig(cfg)
  186. if err != nil {
  187. return nil, err
  188. }
  189. handlers := defaults.Handlers()
  190. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  191. awscfg := aws.NewConfig().WithEndpointResolver(ResolveEndpoint())
  192. if region != "" {
  193. awscfg.WithRegion(region)
  194. }
  195. sess, err := session.NewSessionWithOptions(session.Options{
  196. Config: *awscfg,
  197. SharedConfigState: session.SharedConfigDisable,
  198. Handlers: handlers,
  199. })
  200. if err != nil {
  201. return nil, err
  202. }
  203. tokenFetcher := &authTokenFetcher{
  204. Namespace: namespace,
  205. ServiceAccount: name,
  206. k8sClient: clientset.CoreV1(),
  207. }
  208. return stscreds.NewWebIdentityRoleProviderWithOptions(
  209. sts.New(sess), roleArn, "external-secrets-provider-aws", tokenFetcher), nil
  210. }
  211. type STSProvider func(*session.Session) stsiface.STSAPI
  212. func DefaultSTSProvider(sess *session.Session) stsiface.STSAPI {
  213. return sts.New(sess)
  214. }
  215. // getAWSSession check if an AWS session should be reused
  216. // it returns the aws session or an error.
  217. func getAWSSession(config *aws.Config, prov *esv1beta1.AWSProvider, store esv1beta1.GenericStore, namespace string) (*session.Session, error) {
  218. sessionCache := prov.SessionCache
  219. if sessionCache {
  220. tmpSession := SessionCache{
  221. Name: store.GetObjectMeta().Name,
  222. Namespace: namespace,
  223. Kind: store.GetTypeMeta().Kind,
  224. ResourceVersion: store.GetObjectMeta().ResourceVersion,
  225. }
  226. _, ok := sessions[tmpSession]
  227. if ok {
  228. log.Info("reusing aws session", "SecretStore", tmpSession.Name, "namespace", tmpSession.Namespace, "kind", tmpSession.Kind, "resourceversion", tmpSession.ResourceVersion)
  229. return sessions[tmpSession], nil
  230. } else {
  231. handlers := defaults.Handlers()
  232. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  233. sess, err := session.NewSessionWithOptions(session.Options{
  234. Config: *config,
  235. Handlers: handlers,
  236. SharedConfigState: session.SharedConfigDisable,
  237. })
  238. if err != nil {
  239. return nil, err
  240. }
  241. sessions[tmpSession] = sess
  242. return sess, nil
  243. }
  244. } else {
  245. handlers := defaults.Handlers()
  246. handlers.Build.PushBack(request.WithAppendUserAgent("external-secrets"))
  247. sess, err := session.NewSessionWithOptions(session.Options{
  248. Config: *config,
  249. Handlers: handlers,
  250. SharedConfigState: session.SharedConfigDisable,
  251. })
  252. if err != nil {
  253. return nil, err
  254. }
  255. return sess, nil
  256. }
  257. }