provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package vault
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "time"
  19. vault "github.com/hashicorp/vault/api"
  20. "github.com/spf13/pflag"
  21. "k8s.io/client-go/kubernetes"
  22. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  23. ctrl "sigs.k8s.io/controller-runtime"
  24. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  25. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. vaultutil "github.com/external-secrets/external-secrets/providers/v1/vault/util"
  28. "github.com/external-secrets/external-secrets/runtime/cache"
  29. "github.com/external-secrets/external-secrets/runtime/esutils/resolvers"
  30. "github.com/external-secrets/external-secrets/runtime/feature"
  31. )
  32. var (
  33. _ esv1.Provider = &Provider{}
  34. enableCache bool
  35. logger = ctrl.Log.WithName("provider").WithName("vault")
  36. clientCache *cache.Cache[vaultutil.Client]
  37. )
  38. const (
  39. errVaultStore = "received invalid Vault SecretStore resource: %w"
  40. errVaultClient = "cannot setup new vault client: %w"
  41. errVaultCert = "cannot set Vault CA certificate: %w"
  42. errClientTLSAuth = "error from Client TLS Auth: %q"
  43. errCANamespace = "missing namespace on caProvider secret"
  44. )
  45. const (
  46. defaultCacheSize = 2 << 17
  47. )
  48. // Provider implements the ESO Provider interface for Hashicorp Vault.
  49. type Provider struct {
  50. // NewVaultClient is a function that returns a new Vault client.
  51. // This is used for testing to inject a fake client.
  52. NewVaultClient func(config *vault.Config) (vaultutil.Client, error)
  53. }
  54. // NewVaultClient returns a new Vault client.
  55. func NewVaultClient(config *vault.Config) (vaultutil.Client, error) {
  56. vaultClient, err := vault.NewClient(config)
  57. if err != nil {
  58. return nil, err
  59. }
  60. return &vaultutil.VaultClient{
  61. SetTokenFunc: vaultClient.SetToken,
  62. TokenFunc: vaultClient.Token,
  63. ClearTokenFunc: vaultClient.ClearToken,
  64. AuthField: vaultClient.Auth(),
  65. AuthTokenField: vaultClient.Auth().Token(),
  66. LogicalField: vaultClient.Logical(),
  67. NamespaceFunc: vaultClient.Namespace,
  68. SetNamespaceFunc: vaultClient.SetNamespace,
  69. AddHeaderFunc: vaultClient.AddHeader,
  70. }, nil
  71. }
  72. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  73. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  74. return esv1.SecretStoreReadWrite
  75. }
  76. // NewClient implements the Client interface.
  77. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  78. // controller-runtime/client does not support TokenRequest or other subresource APIs
  79. // so we need to construct our own client and use it to fetch tokens
  80. // (for Kubernetes service account token auth)
  81. restCfg, err := ctrlcfg.GetConfig()
  82. if err != nil {
  83. return nil, err
  84. }
  85. clientset, err := kubernetes.NewForConfig(restCfg)
  86. if err != nil {
  87. return nil, err
  88. }
  89. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  90. }
  91. // NewGeneratorClient creates a new Vault client for the generator controller.
  92. func (p *Provider) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, namespace string, retrySettings *esv1.SecretStoreRetrySettings) (vaultutil.Client, error) {
  93. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, retrySettings, namespace, resolvers.EmptyStoreKind)
  94. if err != nil {
  95. return nil, err
  96. }
  97. client, err := p.NewVaultClient(cfg)
  98. if err != nil {
  99. return nil, err
  100. }
  101. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  102. if err != nil {
  103. return nil, err
  104. }
  105. return client, nil
  106. }
  107. func (p *Provider) newClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  108. storeSpec := store.GetSpec()
  109. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  110. return nil, errors.New(errVaultStore)
  111. }
  112. vaultSpec := storeSpec.Provider.Vault
  113. vStore, cfg, err := p.prepareConfig(
  114. ctx,
  115. kube,
  116. corev1,
  117. vaultSpec,
  118. storeSpec.RetrySettings,
  119. namespace,
  120. store.GetObjectKind().GroupVersionKind().Kind)
  121. if err != nil {
  122. return nil, err
  123. }
  124. client, err := getVaultClient(p, store, cfg, namespace)
  125. if err != nil {
  126. return nil, fmt.Errorf(errVaultClient, err)
  127. }
  128. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  129. }
  130. func (p *Provider) initClient(ctx context.Context, c *client, client vaultutil.Client, cfg *vault.Config, vaultSpec *esv1.VaultProvider) (esv1.SecretsClient, error) {
  131. if vaultSpec.Namespace != nil {
  132. client.SetNamespace(*vaultSpec.Namespace)
  133. }
  134. if vaultSpec.Headers != nil {
  135. for hKey, hValue := range vaultSpec.Headers {
  136. client.AddHeader(hKey, hValue)
  137. }
  138. }
  139. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  140. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  141. }
  142. c.client = client
  143. c.auth = client.Auth()
  144. c.logical = client.Logical()
  145. c.token = client.AuthToken()
  146. // allow SecretStore controller validation to pass
  147. // when using referent namespace.
  148. if c.storeKind == esv1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  149. return c, nil
  150. }
  151. if err := c.setAuth(ctx, cfg); err != nil {
  152. return nil, err
  153. }
  154. return c, nil
  155. }
  156. func (p *Provider) prepareConfig(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1.VaultProvider, retrySettings *esv1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  157. c := &client{
  158. kube: kube,
  159. corev1: corev1,
  160. store: vaultSpec,
  161. log: logger,
  162. namespace: namespace,
  163. storeKind: storeKind,
  164. }
  165. cfg, err := c.newConfig(ctx)
  166. if err != nil {
  167. return nil, nil, err
  168. }
  169. // Setup retry options if present
  170. if retrySettings != nil {
  171. if retrySettings.MaxRetries != nil {
  172. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  173. } else {
  174. // By default we rely only on the reconciliation process for retrying
  175. cfg.MaxRetries = 0
  176. }
  177. if retrySettings.RetryInterval != nil {
  178. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  179. if err != nil {
  180. return nil, nil, err
  181. }
  182. cfg.MinRetryWait = retryWait
  183. cfg.MaxRetryWait = retryWait
  184. }
  185. }
  186. return c, cfg, nil
  187. }
  188. func getVaultClient(p *Provider, store esv1.GenericStore, cfg *vault.Config, namespace string) (vaultutil.Client, error) {
  189. vaultProvider := store.GetSpec().Provider.Vault
  190. auth := vaultProvider.Auth
  191. isStaticToken := auth != nil && auth.TokenSecretRef != nil
  192. useCache := enableCache && !isStaticToken
  193. keyNamespace := store.GetObjectMeta().Namespace
  194. // A single ClusterSecretStore may need to spawn separate vault clients for each namespace.
  195. if store.GetTypeMeta().Kind == esv1.ClusterSecretStoreKind && namespace != "" && isReferentSpec(vaultProvider) {
  196. keyNamespace = namespace
  197. }
  198. key := cache.Key{
  199. Name: store.GetObjectMeta().Name,
  200. Namespace: keyNamespace,
  201. Kind: store.GetTypeMeta().Kind,
  202. }
  203. if useCache {
  204. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  205. if ok {
  206. return client, nil
  207. }
  208. }
  209. client, err := p.NewVaultClient(cfg)
  210. if err != nil {
  211. return nil, fmt.Errorf(errVaultClient, err)
  212. }
  213. if useCache && !clientCache.Contains(key) {
  214. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  215. }
  216. return client, nil
  217. }
  218. func isReferentSpec(prov *esv1.VaultProvider) bool {
  219. if prov.Auth == nil {
  220. return false
  221. }
  222. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  223. return true
  224. }
  225. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  226. return true
  227. }
  228. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  229. return true
  230. }
  231. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  232. return true
  233. }
  234. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  235. return true
  236. }
  237. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  238. return true
  239. }
  240. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  241. return true
  242. }
  243. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  244. return true
  245. }
  246. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  247. return true
  248. }
  249. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  250. return true
  251. }
  252. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  253. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  254. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  255. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  256. return true
  257. }
  258. return false
  259. }
  260. func initCache(size int) {
  261. logger.Info("initializing vault cache", "size", size)
  262. clientCache = cache.Must(size, func(client vaultutil.Client) {
  263. err := revokeTokenIfValid(context.Background(), client)
  264. if err != nil {
  265. logger.Error(err, "unable to revoke cached token on eviction")
  266. }
  267. })
  268. }
  269. func init() {
  270. var vaultTokenCacheSize int
  271. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  272. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  273. // max. 265k vault leases with 30bytes each ~= 7MB
  274. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", defaultCacheSize, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  275. feature.Register(feature.Feature{
  276. Flags: fs,
  277. Initialize: func() { initCache(vaultTokenCacheSize) },
  278. })
  279. }
  280. // NewProvider creates a new Provider instance.
  281. func NewProvider() esv1.Provider {
  282. return &Provider{
  283. NewVaultClient: NewVaultClient,
  284. }
  285. }
  286. // ProviderSpec returns the provider specification for registration.
  287. func ProviderSpec() *esv1.SecretStoreProvider {
  288. return &esv1.SecretStoreProvider{
  289. Vault: &esv1.VaultProvider{},
  290. }
  291. }
  292. // MaintenanceStatus returns the maintenance status of the provider.
  293. func MaintenanceStatus() esv1.MaintenanceStatus {
  294. return esv1.MaintenanceStatusMaintained
  295. }