provider.go 10.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "time"
  18. vault "github.com/hashicorp/vault/api"
  19. "github.com/spf13/pflag"
  20. "k8s.io/client-go/kubernetes"
  21. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  22. ctrl "sigs.k8s.io/controller-runtime"
  23. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  24. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  25. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  26. "github.com/external-secrets/external-secrets/pkg/cache"
  27. "github.com/external-secrets/external-secrets/pkg/feature"
  28. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  29. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  30. )
  31. var (
  32. _ esv1beta1.Provider = &Provider{}
  33. enableCache bool
  34. logger = ctrl.Log.WithName("provider").WithName("vault")
  35. clientCache *cache.Cache[util.Client]
  36. )
  37. const (
  38. errVaultStore = "received invalid Vault SecretStore resource: %w"
  39. errVaultClient = "cannot setup new vault client: %w"
  40. errVaultCert = "cannot set Vault CA certificate: %w"
  41. errClientTLSAuth = "error from Client TLS Auth: %q"
  42. errCANamespace = "missing namespace on caProvider secret"
  43. )
  44. type Provider struct {
  45. // NewVaultClient is a function that returns a new Vault client.
  46. // This is used for testing to inject a fake client.
  47. NewVaultClient func(config *vault.Config) (util.Client, error)
  48. }
  49. // NewVaultClient returns a new Vault client.
  50. func NewVaultClient(config *vault.Config) (util.Client, error) {
  51. vaultClient, err := vault.NewClient(config)
  52. if err != nil {
  53. return nil, err
  54. }
  55. return &util.VaultClient{
  56. SetTokenFunc: vaultClient.SetToken,
  57. TokenFunc: vaultClient.Token,
  58. ClearTokenFunc: vaultClient.ClearToken,
  59. AuthField: vaultClient.Auth(),
  60. AuthTokenField: vaultClient.Auth().Token(),
  61. LogicalField: vaultClient.Logical(),
  62. NamespaceFunc: vaultClient.Namespace,
  63. SetNamespaceFunc: vaultClient.SetNamespace,
  64. AddHeaderFunc: vaultClient.AddHeader,
  65. }, nil
  66. }
  67. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  68. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  69. return esv1beta1.SecretStoreReadWrite
  70. }
  71. // NewClient implements the Client interface.
  72. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  73. // controller-runtime/client does not support TokenRequest or other subresource APIs
  74. // so we need to construct our own client and use it to fetch tokens
  75. // (for Kubernetes service account token auth)
  76. restCfg, err := ctrlcfg.GetConfig()
  77. if err != nil {
  78. return nil, err
  79. }
  80. clientset, err := kubernetes.NewForConfig(restCfg)
  81. if err != nil {
  82. return nil, err
  83. }
  84. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  85. }
  86. func (p *Provider) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, namespace string, retrySettings *esv1beta1.SecretStoreRetrySettings) (util.Client, error) {
  87. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, retrySettings, namespace, resolvers.EmptyStoreKind)
  88. if err != nil {
  89. return nil, err
  90. }
  91. client, err := p.NewVaultClient(cfg)
  92. if err != nil {
  93. return nil, err
  94. }
  95. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  96. if err != nil {
  97. return nil, err
  98. }
  99. return client, nil
  100. }
  101. func (p *Provider) newClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  102. storeSpec := store.GetSpec()
  103. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  104. return nil, errors.New(errVaultStore)
  105. }
  106. vaultSpec := storeSpec.Provider.Vault
  107. vStore, cfg, err := p.prepareConfig(
  108. ctx,
  109. kube,
  110. corev1,
  111. vaultSpec,
  112. storeSpec.RetrySettings,
  113. namespace,
  114. store.GetObjectKind().GroupVersionKind().Kind)
  115. if err != nil {
  116. return nil, err
  117. }
  118. client, err := getVaultClient(p, store, cfg)
  119. if err != nil {
  120. return nil, fmt.Errorf(errVaultClient, err)
  121. }
  122. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  123. }
  124. func (p *Provider) initClient(ctx context.Context, c *client, client util.Client, cfg *vault.Config, vaultSpec *esv1beta1.VaultProvider) (esv1beta1.SecretsClient, error) {
  125. if vaultSpec.Namespace != nil {
  126. client.SetNamespace(*vaultSpec.Namespace)
  127. }
  128. if vaultSpec.Headers != nil {
  129. for hKey, hValue := range vaultSpec.Headers {
  130. client.AddHeader(hKey, hValue)
  131. }
  132. }
  133. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  134. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  135. }
  136. c.client = client
  137. c.auth = client.Auth()
  138. c.logical = client.Logical()
  139. c.token = client.AuthToken()
  140. // allow SecretStore controller validation to pass
  141. // when using referent namespace.
  142. if c.storeKind == esv1beta1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  143. return c, nil
  144. }
  145. if err := c.setAuth(ctx, cfg); err != nil {
  146. return nil, err
  147. }
  148. return c, nil
  149. }
  150. func (p *Provider) prepareConfig(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, retrySettings *esv1beta1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  151. c := &client{
  152. kube: kube,
  153. corev1: corev1,
  154. store: vaultSpec,
  155. log: logger,
  156. namespace: namespace,
  157. storeKind: storeKind,
  158. }
  159. cfg, err := c.newConfig(ctx)
  160. if err != nil {
  161. return nil, nil, err
  162. }
  163. // Setup retry options if present
  164. if retrySettings != nil {
  165. if retrySettings.MaxRetries != nil {
  166. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  167. } else {
  168. // By default we rely only on the reconciliation process for retrying
  169. cfg.MaxRetries = 0
  170. }
  171. if retrySettings.RetryInterval != nil {
  172. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  173. if err != nil {
  174. return nil, nil, err
  175. }
  176. cfg.MinRetryWait = retryWait
  177. cfg.MaxRetryWait = retryWait
  178. }
  179. }
  180. return c, cfg, nil
  181. }
  182. func getVaultClient(p *Provider, store esv1beta1.GenericStore, cfg *vault.Config) (util.Client, error) {
  183. isStaticToken := store.GetSpec().Provider.Vault.Auth.TokenSecretRef != nil
  184. useCache := enableCache && !isStaticToken
  185. key := cache.Key{
  186. Name: store.GetObjectMeta().Name,
  187. Namespace: store.GetObjectMeta().Namespace,
  188. Kind: store.GetTypeMeta().Kind,
  189. }
  190. if useCache {
  191. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  192. if ok {
  193. return client, nil
  194. }
  195. }
  196. client, err := p.NewVaultClient(cfg)
  197. if err != nil {
  198. return nil, fmt.Errorf(errVaultClient, err)
  199. }
  200. if useCache && !clientCache.Contains(key) {
  201. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  202. }
  203. return client, nil
  204. }
  205. func isReferentSpec(prov *esv1beta1.VaultProvider) bool {
  206. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  207. return true
  208. }
  209. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  210. return true
  211. }
  212. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  213. return true
  214. }
  215. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  216. return true
  217. }
  218. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  219. return true
  220. }
  221. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  222. return true
  223. }
  224. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  225. return true
  226. }
  227. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  228. return true
  229. }
  230. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  231. return true
  232. }
  233. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  234. return true
  235. }
  236. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  237. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  238. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  239. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  240. return true
  241. }
  242. return false
  243. }
  244. func init() {
  245. var vaultTokenCacheSize int
  246. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  247. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  248. // max. 265k vault leases with 30bytes each ~= 7MB
  249. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", 2<<17, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  250. lateInit := func() {
  251. logger.Info("initializing vault cache", "size", vaultTokenCacheSize)
  252. clientCache = cache.Must(vaultTokenCacheSize, func(client util.Client) {
  253. err := revokeTokenIfValid(context.Background(), client)
  254. if err != nil {
  255. logger.Error(err, "unable to revoke cached token on eviction")
  256. }
  257. })
  258. }
  259. feature.Register(feature.Feature{
  260. Flags: fs,
  261. Initialize: lateInit,
  262. })
  263. esv1beta1.Register(&Provider{
  264. NewVaultClient: NewVaultClient,
  265. }, &esv1beta1.SecretStoreProvider{
  266. Vault: &esv1beta1.VaultProvider{},
  267. })
  268. }