| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package akeyless
- import (
- "context"
- "encoding/base64"
- "errors"
- "fmt"
- "io"
- "os"
- "strings"
- aws_cloud_id "github.com/akeylesslabs/akeyless-go-cloud-id/cloudprovider/aws"
- azure_cloud_id "github.com/akeylesslabs/akeyless-go-cloud-id/cloudprovider/azure"
- gcp_cloud_id "github.com/akeylesslabs/akeyless-go-cloud-id/cloudprovider/gcp"
- "github.com/akeylesslabs/akeyless-go/v2"
- //nolint
- . "github.com/onsi/ginkgo/v2"
- //nolint
- . "github.com/onsi/gomega"
- v1 "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
- "github.com/external-secrets/external-secrets/e2e/framework"
- )
- type akeylessProvider struct {
- accessID string
- accessType string
- accessTypeParam string
- framework *framework.Framework
- restAPIClient *akeyless.V2ApiService
- }
- var apiErr akeyless.GenericOpenAPIError
- const DefServiceAccountFile = "/var/run/secrets/kubernetes.io/serviceaccount/token"
- func newAkeylessProvider(f *framework.Framework, accessID, accessType, accessTypeParam string) *akeylessProvider {
- prov := &akeylessProvider{
- accessID: accessID,
- accessType: accessType,
- accessTypeParam: accessTypeParam,
- framework: f,
- }
- restAPIClient := akeyless.NewAPIClient(&akeyless.Configuration{
- Servers: []akeyless.ServerConfiguration{
- {
- URL: "https://api.akeyless.io",
- },
- },
- }).V2Api
- prov.restAPIClient = restAPIClient
- BeforeEach(prov.BeforeEach)
- return prov
- }
- func newFromEnv(f *framework.Framework) *akeylessProvider {
- accessID := os.Getenv("AKEYLESS_ACCESS_ID")
- accessType := os.Getenv("AKEYLESS_ACCESS_TYPE")
- accessTypeParam := os.Getenv("AKEYLESS_ACCESS_TYPE_PARAM")
- return newAkeylessProvider(f, accessID, accessType, accessTypeParam)
- }
- // CreateSecret creates a secret.
- func (a *akeylessProvider) CreateSecret(key string, val framework.SecretEntry) {
- token, err := a.GetToken()
- Expect(err).ToNot(HaveOccurred())
- ctx := context.Background()
- gsvBody := akeyless.CreateSecret{
- Name: key,
- Value: val.Value,
- Token: &token,
- }
- _, _, err = a.restAPIClient.CreateSecret(ctx).Body(gsvBody).Execute()
- Expect(err).ToNot(HaveOccurred())
- }
- func (a *akeylessProvider) DeleteSecret(key string) {
- token, err := a.GetToken()
- Expect(err).ToNot(HaveOccurred())
- ctx := context.Background()
- gsvBody := akeyless.DeleteItem{
- Name: key,
- Token: &token,
- }
- _, _, err = a.restAPIClient.DeleteItem(ctx).Body(gsvBody).Execute()
- Expect(err).ToNot(HaveOccurred())
- }
- func (a *akeylessProvider) BeforeEach() {
- // Creating an Akeyless secret
- akeylessCreds := &v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Name: "provider-secret",
- Namespace: a.framework.Namespace.Name,
- },
- StringData: map[string]string{
- "access-id": a.accessID,
- "access-type": a.accessType,
- "access-type-param": a.accessTypeParam,
- },
- }
- err := a.framework.CRClient.Create(context.Background(), akeylessCreds)
- Expect(err).ToNot(HaveOccurred())
- // Creating Akeyless secret store
- secretStore := &esv1beta1.SecretStore{
- ObjectMeta: metav1.ObjectMeta{
- Name: a.framework.Namespace.Name,
- Namespace: a.framework.Namespace.Name,
- },
- Spec: esv1beta1.SecretStoreSpec{
- Provider: &esv1beta1.SecretStoreProvider{
- Akeyless: &esv1beta1.AkeylessProvider{
- Auth: &esv1beta1.AkeylessAuth{
- SecretRef: esv1beta1.AkeylessAuthSecretRef{
- AccessID: esmeta.SecretKeySelector{
- Name: "access-id-secret",
- Key: "access-id",
- },
- AccessType: esmeta.SecretKeySelector{
- Name: "access-type-secret",
- Key: "access-type",
- },
- AccessTypeParam: esmeta.SecretKeySelector{
- Name: "access-type-param-secert",
- Key: "access-type-param",
- },
- },
- },
- },
- },
- },
- }
- err = a.framework.CRClient.Create(context.Background(), secretStore)
- Expect(err).ToNot(HaveOccurred())
- }
- func (a *akeylessProvider) GetToken() (string, error) {
- ctx := context.Background()
- authBody := akeyless.NewAuthWithDefaults()
- authBody.AccessId = akeyless.PtrString(a.accessID)
- if a.accessType == "api_key" {
- authBody.AccessKey = akeyless.PtrString(a.accessTypeParam)
- } else if a.accessType == "k8s" {
- jwtString, err := readK8SServiceAccountJWT()
- if err != nil {
- return "", fmt.Errorf("failed to read JWT with Kubernetes Auth from %v. error: %w", DefServiceAccountFile, err)
- }
- K8SAuthConfigName := a.accessTypeParam
- authBody.AccessType = akeyless.PtrString(a.accessType)
- authBody.K8sServiceAccountToken = akeyless.PtrString(jwtString)
- authBody.K8sAuthConfigName = akeyless.PtrString(K8SAuthConfigName)
- } else {
- cloudID, err := a.getCloudID(a.accessType, a.accessTypeParam)
- if err != nil {
- return "", fmt.Errorf("Require Cloud ID " + err.Error())
- }
- authBody.AccessType = akeyless.PtrString(a.accessType)
- authBody.CloudId = akeyless.PtrString(cloudID)
- }
- authOut, _, err := a.restAPIClient.Auth(ctx).Body(*authBody).Execute()
- if err != nil {
- if errors.As(err, &apiErr) {
- return "", fmt.Errorf("authentication failed: %v", string(apiErr.Body()))
- }
- return "", fmt.Errorf("authentication failed: %w", err)
- }
- token := authOut.GetToken()
- return token, nil
- }
- func (a *akeylessProvider) getCloudID(provider, accTypeParam string) (string, error) {
- var cloudID string
- var err error
- switch provider {
- case "azure_ad":
- cloudID, err = azure_cloud_id.GetCloudId(accTypeParam)
- case "aws_iam":
- cloudID, err = aws_cloud_id.GetCloudId()
- case "gcp":
- cloudID, err = gcp_cloud_id.GetCloudID(accTypeParam)
- default:
- return "", fmt.Errorf("unable to determine provider: %s", provider)
- }
- return cloudID, err
- }
- // readK8SServiceAccountJWT reads the JWT data for the Agent to submit to Akeyless Gateway.
- func readK8SServiceAccountJWT() (string, error) {
- data, err := os.Open(DefServiceAccountFile)
- if err != nil {
- return "", err
- }
- defer data.Close()
- contentBytes, err := io.ReadAll(data)
- if err != nil {
- return "", err
- }
- a := strings.TrimSpace(string(contentBytes))
- return base64.StdEncoding.EncodeToString([]byte(a)), nil
- }
|