akeyless.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package akeyless
  13. import (
  14. "context"
  15. "crypto/tls"
  16. "crypto/x509"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/http"
  21. "net/url"
  22. "strconv"
  23. "strings"
  24. "time"
  25. "github.com/akeylesslabs/akeyless-go/v3"
  26. corev1 "k8s.io/api/core/v1"
  27. "k8s.io/client-go/kubernetes"
  28. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  29. "sigs.k8s.io/controller-runtime/pkg/client"
  30. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  31. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  32. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  33. "github.com/external-secrets/external-secrets/pkg/find"
  34. "github.com/external-secrets/external-secrets/pkg/utils"
  35. )
  36. const (
  37. defaultAPIUrl = "https://api.akeyless.io"
  38. )
  39. // https://github.com/external-secrets/external-secrets/issues/644
  40. var _ esv1beta1.SecretsClient = &Akeyless{}
  41. var _ esv1beta1.Provider = &Provider{}
  42. // Provider satisfies the provider interface.
  43. type Provider struct{}
  44. // akeylessBase satisfies the provider.SecretsClient interface.
  45. type akeylessBase struct {
  46. kube client.Client
  47. store esv1beta1.GenericStore
  48. storeKind string
  49. corev1 typedcorev1.CoreV1Interface
  50. namespace string
  51. akeylessGwAPIURL string
  52. RestAPI *akeyless.V2ApiService
  53. }
  54. type Akeyless struct {
  55. Client akeylessVaultInterface
  56. url string
  57. }
  58. type akeylessVaultInterface interface {
  59. GetSecretByType(ctx context.Context, secretName, token string, version int32) (string, error)
  60. TokenFromSecretRef(ctx context.Context) (string, error)
  61. ListSecrets(ctx context.Context, path, tag, token string) ([]string, error)
  62. }
  63. func init() {
  64. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  65. Akeyless: &esv1beta1.AkeylessProvider{},
  66. })
  67. }
  68. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  69. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  70. return esv1beta1.SecretStoreReadOnly
  71. }
  72. // NewClient constructs a new secrets client based on the provided store.
  73. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  74. // controller-runtime/client does not support TokenRequest or other subresource APIs
  75. // so we need to construct our own client and use it to fetch tokens
  76. // (for Kubernetes service account token auth)
  77. restCfg, err := ctrlcfg.GetConfig()
  78. if err != nil {
  79. return nil, err
  80. }
  81. clientset, err := kubernetes.NewForConfig(restCfg)
  82. if err != nil {
  83. return nil, err
  84. }
  85. return newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  86. }
  87. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  88. storeSpec := store.GetSpec()
  89. akeylessSpec := storeSpec.Provider.Akeyless
  90. akeylessGWApiURL := akeylessSpec.AkeylessGWApiURL
  91. if akeylessGWApiURL != nil && *akeylessGWApiURL != "" {
  92. url, err := url.Parse(*akeylessGWApiURL)
  93. if err != nil {
  94. return fmt.Errorf(errInvalidAkeylessURL)
  95. }
  96. if url.Host == "" {
  97. return fmt.Errorf(errInvalidAkeylessURL)
  98. }
  99. }
  100. if akeylessSpec.Auth.KubernetesAuth != nil {
  101. if akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef != nil {
  102. if err := utils.ValidateReferentServiceAccountSelector(store, *akeylessSpec.Auth.KubernetesAuth.ServiceAccountRef); err != nil {
  103. return fmt.Errorf(errInvalidKubeSA, err)
  104. }
  105. }
  106. if akeylessSpec.Auth.KubernetesAuth.SecretRef != nil {
  107. err := utils.ValidateSecretSelector(store, *akeylessSpec.Auth.KubernetesAuth.SecretRef)
  108. if err != nil {
  109. return err
  110. }
  111. }
  112. if akeylessSpec.Auth.KubernetesAuth.AccessID == "" {
  113. return fmt.Errorf("missing kubernetes auth-method access-id")
  114. }
  115. if akeylessSpec.Auth.KubernetesAuth.K8sConfName == "" {
  116. return fmt.Errorf("missing kubernetes config name")
  117. }
  118. return nil
  119. }
  120. accessID := akeylessSpec.Auth.SecretRef.AccessID
  121. err := utils.ValidateSecretSelector(store, accessID)
  122. if err != nil {
  123. return err
  124. }
  125. if accessID.Name == "" {
  126. return fmt.Errorf(errInvalidAkeylessAccessIDName)
  127. }
  128. if accessID.Key == "" {
  129. return fmt.Errorf(errInvalidAkeylessAccessIDKey)
  130. }
  131. accessType := akeylessSpec.Auth.SecretRef.AccessType
  132. err = utils.ValidateSecretSelector(store, accessType)
  133. if err != nil {
  134. return err
  135. }
  136. accessTypeParam := akeylessSpec.Auth.SecretRef.AccessTypeParam
  137. err = utils.ValidateSecretSelector(store, accessTypeParam)
  138. if err != nil {
  139. return err
  140. }
  141. return nil
  142. }
  143. func newClient(_ context.Context, store esv1beta1.GenericStore, kube client.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  144. akl := &akeylessBase{
  145. kube: kube,
  146. store: store,
  147. namespace: namespace,
  148. corev1: corev1,
  149. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  150. }
  151. spec, err := GetAKeylessProvider(store)
  152. if err != nil {
  153. return nil, err
  154. }
  155. akeylessGwAPIURL := defaultAPIUrl
  156. if spec != nil && spec.AkeylessGWApiURL != nil && *spec.AkeylessGWApiURL != "" {
  157. akeylessGwAPIURL = getV2Url(*spec.AkeylessGWApiURL)
  158. }
  159. if spec.Auth == nil {
  160. return nil, fmt.Errorf("missing Auth in store config")
  161. }
  162. client, err := akl.getAkeylessHTTPClient(spec)
  163. if err != nil {
  164. return nil, err
  165. }
  166. RestAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
  167. HTTPClient: client,
  168. Servers: []akeyless.ServerConfiguration{
  169. {
  170. URL: akeylessGwAPIURL,
  171. },
  172. },
  173. }).V2Api
  174. akl.akeylessGwAPIURL = akeylessGwAPIURL
  175. akl.RestAPI = RestAPIClient
  176. return &Akeyless{Client: akl, url: akeylessGwAPIURL}, nil
  177. }
  178. func (a *Akeyless) Close(ctx context.Context) error {
  179. return nil
  180. }
  181. func (a *Akeyless) Validate() (esv1beta1.ValidationResult, error) {
  182. timeout := 15 * time.Second
  183. url := a.url
  184. if err := utils.NetworkValidate(url, timeout); err != nil {
  185. return esv1beta1.ValidationResultError, err
  186. }
  187. return esv1beta1.ValidationResultReady, nil
  188. }
  189. func (a *Akeyless) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  190. return fmt.Errorf("not implemented")
  191. }
  192. func (a *Akeyless) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  193. return fmt.Errorf("not implemented")
  194. }
  195. // Implements store.Client.GetSecret Interface.
  196. // Retrieves a secret with the secret name defined in ref.Name.
  197. func (a *Akeyless) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  198. if utils.IsNil(a.Client) {
  199. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  200. }
  201. token, err := a.Client.TokenFromSecretRef(ctx)
  202. if err != nil {
  203. return nil, err
  204. }
  205. version := int32(0)
  206. if ref.Version != "" {
  207. i, err := strconv.ParseInt(ref.Version, 10, 32)
  208. if err == nil {
  209. version = int32(i)
  210. }
  211. }
  212. value, err := a.Client.GetSecretByType(ctx, ref.Key, token, version)
  213. if err != nil {
  214. return nil, err
  215. }
  216. return []byte(value), nil
  217. }
  218. // Implements store.Client.GetAllSecrets Interface.
  219. // Retrieves a all secrets with defined in ref.Name or tags.
  220. func (a *Akeyless) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  221. if utils.IsNil(a.Client) {
  222. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  223. }
  224. searchPath := ""
  225. if ref.Path != nil {
  226. searchPath = *ref.Path
  227. if !strings.HasPrefix(searchPath, "/") {
  228. searchPath = "/" + searchPath
  229. }
  230. if !strings.HasSuffix(searchPath, "/") {
  231. searchPath += "/"
  232. }
  233. }
  234. token, err := a.Client.TokenFromSecretRef(ctx)
  235. if err != nil {
  236. return nil, err
  237. }
  238. if ref.Name != nil {
  239. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, "", token)
  240. if err != nil {
  241. return nil, err
  242. }
  243. if len(potentialSecrets) == 0 {
  244. return nil, nil
  245. }
  246. return a.findSecretsFromName(ctx, potentialSecrets, *ref.Name, token)
  247. }
  248. if len(ref.Tags) > 0 {
  249. var potentialSecretsName []string
  250. for _, v := range ref.Tags {
  251. potentialSecrets, err := a.Client.ListSecrets(ctx, searchPath, v, token)
  252. if err != nil {
  253. return nil, err
  254. }
  255. if len(potentialSecrets) > 0 {
  256. potentialSecretsName = append(potentialSecretsName, potentialSecrets...)
  257. }
  258. }
  259. if len(potentialSecretsName) == 0 {
  260. return nil, nil
  261. }
  262. return a.getSecrets(ctx, potentialSecretsName, token)
  263. }
  264. return nil, errors.New("unexpected find operator")
  265. }
  266. func (a *Akeyless) getSecrets(ctx context.Context, candidates []string, token string) (map[string][]byte, error) {
  267. secrets := make(map[string][]byte)
  268. for _, name := range candidates {
  269. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  270. if err != nil {
  271. return nil, err
  272. }
  273. if secretValue != "" {
  274. secrets[name] = []byte(secretValue)
  275. }
  276. }
  277. return secrets, nil
  278. }
  279. func (a *Akeyless) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName, token string) (map[string][]byte, error) {
  280. secrets := make(map[string][]byte)
  281. matcher, err := find.New(ref)
  282. if err != nil {
  283. return nil, err
  284. }
  285. for _, name := range candidates {
  286. ok := matcher.MatchName(name)
  287. if ok {
  288. secretValue, err := a.Client.GetSecretByType(ctx, name, token, 0)
  289. if err != nil {
  290. return nil, err
  291. }
  292. if secretValue != "" {
  293. secrets[name] = []byte(secretValue)
  294. }
  295. }
  296. }
  297. return secrets, nil
  298. }
  299. // Implements store.Client.GetSecretMap Interface.
  300. // New version of GetSecretMap.
  301. func (a *Akeyless) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  302. if utils.IsNil(a.Client) {
  303. return nil, fmt.Errorf(errUninitalizedAkeylessProvider)
  304. }
  305. val, err := a.GetSecret(ctx, ref)
  306. if err != nil {
  307. return nil, err
  308. }
  309. // Maps the json data to a string:string map
  310. kv := make(map[string]string)
  311. err = json.Unmarshal(val, &kv)
  312. if err != nil {
  313. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  314. }
  315. // Converts values in K:V pairs into bytes, while leaving keys as strings
  316. secretData := make(map[string][]byte)
  317. for k, v := range kv {
  318. secretData[k] = []byte(v)
  319. }
  320. return secretData, nil
  321. }
  322. func (a *akeylessBase) getAkeylessHTTPClient(provider *esv1beta1.AkeylessProvider) (*http.Client, error) {
  323. client := &http.Client{Timeout: 30 * time.Second}
  324. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  325. return client, nil
  326. }
  327. caCertPool, err := a.getCACertPool(provider)
  328. if err != nil {
  329. return nil, err
  330. }
  331. tlsConf := &tls.Config{
  332. RootCAs: caCertPool,
  333. MinVersion: tls.VersionTLS12,
  334. }
  335. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  336. return client, nil
  337. }
  338. func (a *akeylessBase) getCACertPool(provider *esv1beta1.AkeylessProvider) (*x509.CertPool, error) {
  339. caCertPool := x509.NewCertPool()
  340. if len(provider.CABundle) > 0 {
  341. pem, err := base64decode(provider.CABundle)
  342. if err != nil {
  343. pem = provider.CABundle
  344. }
  345. ok := caCertPool.AppendCertsFromPEM(pem)
  346. if !ok {
  347. return nil, fmt.Errorf("failed to append cabundle")
  348. }
  349. }
  350. if provider.CAProvider != nil && a.storeKind == esv1beta1.ClusterSecretStoreKind && provider.CAProvider.Namespace == nil {
  351. return nil, fmt.Errorf("missing namespace on CAProvider secret")
  352. }
  353. if provider.CAProvider != nil {
  354. var cert []byte
  355. var err error
  356. switch provider.CAProvider.Type {
  357. case esv1beta1.CAProviderTypeSecret:
  358. cert, err = a.getCertFromSecret(provider)
  359. case esv1beta1.CAProviderTypeConfigMap:
  360. cert, err = a.getCertFromConfigMap(provider)
  361. default:
  362. err = fmt.Errorf("unknown caprovider type: %s", provider.CAProvider.Type)
  363. }
  364. if err != nil {
  365. return nil, err
  366. }
  367. pem, err := base64decode(cert)
  368. if err != nil {
  369. pem = cert
  370. }
  371. ok := caCertPool.AppendCertsFromPEM(pem)
  372. if !ok {
  373. return nil, fmt.Errorf("failed to append cabundle")
  374. }
  375. }
  376. return caCertPool, nil
  377. }
  378. func (a *akeylessBase) getCertFromSecret(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  379. secretRef := esmeta.SecretKeySelector{
  380. Name: provider.CAProvider.Name,
  381. Key: provider.CAProvider.Key,
  382. }
  383. if provider.CAProvider.Namespace != nil {
  384. secretRef.Namespace = provider.CAProvider.Namespace
  385. }
  386. ctx := context.Background()
  387. res, err := a.secretKeyRef(ctx, &secretRef)
  388. if err != nil {
  389. return nil, err
  390. }
  391. return []byte(res), nil
  392. }
  393. func (a *akeylessBase) getCertFromConfigMap(provider *esv1beta1.AkeylessProvider) ([]byte, error) {
  394. objKey := client.ObjectKey{
  395. Name: provider.CAProvider.Name,
  396. }
  397. if provider.CAProvider.Namespace != nil {
  398. objKey.Namespace = *provider.CAProvider.Namespace
  399. }
  400. configMapRef := &corev1.ConfigMap{}
  401. ctx := context.Background()
  402. err := a.kube.Get(ctx, objKey, configMapRef)
  403. if err != nil {
  404. return nil, fmt.Errorf("failed to get caprovider secret %s: %w", objKey.Name, err)
  405. }
  406. val, ok := configMapRef.Data[provider.CAProvider.Key]
  407. if !ok {
  408. return nil, fmt.Errorf("failed to get caprovider configmap %s -> %s", objKey.Name, provider.CAProvider.Key)
  409. }
  410. return []byte(val), nil
  411. }