vault.go 56 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/tls"
  17. "crypto/x509"
  18. "encoding/json"
  19. "errors"
  20. "fmt"
  21. "net/http"
  22. "os"
  23. "reflect"
  24. "strconv"
  25. "strings"
  26. "time"
  27. "github.com/aws/aws-sdk-go/aws"
  28. "github.com/aws/aws-sdk-go/aws/credentials"
  29. "github.com/aws/aws-sdk-go/aws/credentials/stscreds"
  30. "github.com/go-logr/logr"
  31. "github.com/golang-jwt/jwt/v5"
  32. vault "github.com/hashicorp/vault/api"
  33. approle "github.com/hashicorp/vault/api/auth/approle"
  34. authaws "github.com/hashicorp/vault/api/auth/aws"
  35. authkubernetes "github.com/hashicorp/vault/api/auth/kubernetes"
  36. authldap "github.com/hashicorp/vault/api/auth/ldap"
  37. authuserpass "github.com/hashicorp/vault/api/auth/userpass"
  38. "github.com/spf13/pflag"
  39. "github.com/tidwall/gjson"
  40. authenticationv1 "k8s.io/api/authentication/v1"
  41. corev1 "k8s.io/api/core/v1"
  42. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  43. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  44. "k8s.io/apimachinery/pkg/types"
  45. "k8s.io/client-go/kubernetes"
  46. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  47. ctrl "sigs.k8s.io/controller-runtime"
  48. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  49. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  50. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  51. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  52. "github.com/external-secrets/external-secrets/pkg/cache"
  53. "github.com/external-secrets/external-secrets/pkg/constants"
  54. "github.com/external-secrets/external-secrets/pkg/feature"
  55. "github.com/external-secrets/external-secrets/pkg/find"
  56. "github.com/external-secrets/external-secrets/pkg/metrics"
  57. vaultiamauth "github.com/external-secrets/external-secrets/pkg/provider/vault/iamauth"
  58. "github.com/external-secrets/external-secrets/pkg/provider/vault/util"
  59. "github.com/external-secrets/external-secrets/pkg/utils"
  60. )
  61. var (
  62. _ esv1beta1.Provider = &Connector{}
  63. _ esv1beta1.SecretsClient = &client{}
  64. enableCache bool
  65. logger = ctrl.Log.WithName("provider").WithName("vault")
  66. clientCache *cache.Cache[util.Client]
  67. )
  68. const (
  69. serviceAccTokenPath = "/var/run/secrets/kubernetes.io/serviceaccount/token"
  70. defaultAWSRegion = "us-east-1"
  71. defaultAWSAuthMountPath = "aws"
  72. errVaultStore = "received invalid Vault SecretStore resource: %w"
  73. errVaultCacheCreate = "cannot create Vault client cache: %s"
  74. errVaultCacheRemove = "error removing item from Vault client cache: %w"
  75. errVaultCacheEviction = "unexpected eviction from Vault client cache"
  76. errVaultClient = "cannot setup new vault client: %w"
  77. errVaultCert = "cannot set Vault CA certificate: %w"
  78. errReadSecret = "cannot read secret data from Vault: %w"
  79. errAuthFormat = "cannot initialize Vault client: no valid auth method specified"
  80. errInvalidCredentials = "invalid vault credentials: %w"
  81. errDataField = "failed to find data field"
  82. errJSONUnmarshall = "failed to unmarshall JSON"
  83. errPathInvalid = "provided Path isn't a valid kv v2 path"
  84. errSecretFormat = "secret data for property %s not in expected format: %s"
  85. errUnexpectedKey = "unexpected key in data: %s"
  86. errVaultToken = "cannot parse Vault authentication token: %w"
  87. errVaultRequest = "error from Vault request: %w"
  88. errServiceAccount = "cannot read Kubernetes service account token from file system: %w"
  89. errJwtNoTokenSource = "neither `secretRef` nor `kubernetesServiceAccountToken` was supplied as token source for jwt authentication"
  90. errUnsupportedKvVersion = "cannot perform find operations with kv version v1"
  91. errUnsupportedMetadataKvVersion = "cannot perform metadata fetch operations with kv version v1"
  92. errNotFound = "secret not found"
  93. errIrsaTokenEnvVarNotFoundOnPod = "expected env variable: %s not found on controller's pod"
  94. errIrsaTokenFileNotFoundOnPod = "web ddentity token file not found at %s location: %w"
  95. errIrsaTokenFileNotReadable = "could not read the web identity token from the file %s: %w"
  96. errIrsaTokenNotValidJWT = "could not parse web identity token available at %s. not a valid jwt?: %w"
  97. errPodInfoNotFoundOnToken = "could not find pod identity info on token %s: %w"
  98. errGetKubeSA = "cannot get Kubernetes service account %q: %w"
  99. errGetKubeSASecrets = "cannot find secrets bound to service account: %q"
  100. errGetKubeSANoToken = "cannot find token in secrets bound to service account: %q"
  101. errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
  102. errGetKubeSecret = "cannot get Kubernetes secret %q: %w"
  103. errSecretKeyFmt = "cannot find secret data for key: %q"
  104. errConfigMapFmt = "cannot find config map data for key: %q"
  105. errClientTLSAuth = "error from Client TLS Auth: %q"
  106. errVaultRevokeToken = "error while revoking token: %w"
  107. errUnknownCAProvider = "unknown caProvider type given"
  108. errCANamespace = "cannot read secret for CAProvider due to missing namespace on kind ClusterSecretStore"
  109. errInvalidStore = "invalid store"
  110. errInvalidStoreSpec = "invalid store spec"
  111. errInvalidStoreProv = "invalid store provider"
  112. errInvalidVaultProv = "invalid vault provider"
  113. errInvalidAppRoleID = "invalid Auth.AppRole: neither `roleId` nor `roleRef` was supplied"
  114. errInvalidAppRoleRef = "invalid Auth.AppRole.RoleRef: %w"
  115. errInvalidAppRoleSec = "invalid Auth.AppRole.SecretRef: %w"
  116. errInvalidClientCert = "invalid Auth.Cert.ClientCert: %w"
  117. errInvalidCertSec = "invalid Auth.Cert.SecretRef: %w"
  118. errInvalidJwtSec = "invalid Auth.Jwt.SecretRef: %w"
  119. errInvalidJwtK8sSA = "invalid Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef: %w"
  120. errInvalidKubeSA = "invalid Auth.Kubernetes.ServiceAccountRef: %w"
  121. errInvalidKubeSec = "invalid Auth.Kubernetes.SecretRef: %w"
  122. errInvalidLdapSec = "invalid Auth.Ldap.SecretRef: %w"
  123. errInvalidTokenRef = "invalid Auth.TokenSecretRef: %w"
  124. errInvalidUserPassSec = "invalid Auth.UserPass.SecretRef: %w"
  125. )
  126. // https://github.com/external-secrets/external-secrets/issues/644
  127. var _ esv1beta1.SecretsClient = &client{}
  128. var _ esv1beta1.Provider = &Connector{}
  129. type client struct {
  130. kube kclient.Client
  131. store *esv1beta1.VaultProvider
  132. log logr.Logger
  133. corev1 typedcorev1.CoreV1Interface
  134. client util.Client
  135. auth util.Auth
  136. logical util.Logical
  137. token util.Token
  138. namespace string
  139. storeKind string
  140. }
  141. func NewVaultClient(c *vault.Config) (util.Client, error) {
  142. cl, err := vault.NewClient(c)
  143. if err != nil {
  144. return nil, err
  145. }
  146. auth := cl.Auth()
  147. logical := cl.Logical()
  148. token := cl.Auth().Token()
  149. out := util.VClient{
  150. SetTokenFunc: cl.SetToken,
  151. TokenFunc: cl.Token,
  152. ClearTokenFunc: cl.ClearToken,
  153. AuthField: auth,
  154. AuthTokenField: token,
  155. LogicalField: logical,
  156. SetNamespaceFunc: cl.SetNamespace,
  157. AddHeaderFunc: cl.AddHeader,
  158. }
  159. return &out, nil
  160. }
  161. func getVaultClient(c *Connector, store esv1beta1.GenericStore, cfg *vault.Config) (util.Client, error) {
  162. isStaticToken := store.GetSpec().Provider.Vault.Auth.TokenSecretRef != nil
  163. useCache := enableCache && !isStaticToken
  164. key := cache.Key{
  165. Name: store.GetObjectMeta().Name,
  166. Namespace: store.GetObjectMeta().Namespace,
  167. Kind: store.GetTypeMeta().Kind,
  168. }
  169. if useCache {
  170. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  171. if ok {
  172. return client, nil
  173. }
  174. }
  175. client, err := c.NewVaultClient(cfg)
  176. if err != nil {
  177. return nil, fmt.Errorf(errVaultClient, err)
  178. }
  179. if useCache && !clientCache.Contains(key) {
  180. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  181. }
  182. return client, nil
  183. }
  184. type Connector struct {
  185. NewVaultClient func(c *vault.Config) (util.Client, error)
  186. }
  187. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  188. func (c *Connector) Capabilities() esv1beta1.SecretStoreCapabilities {
  189. return esv1beta1.SecretStoreReadWrite
  190. }
  191. func (c *Connector) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  192. // controller-runtime/client does not support TokenRequest or other subresource APIs
  193. // so we need to construct our own client and use it to fetch tokens
  194. // (for Kubernetes service account token auth)
  195. restCfg, err := ctrlcfg.GetConfig()
  196. if err != nil {
  197. return nil, err
  198. }
  199. clientset, err := kubernetes.NewForConfig(restCfg)
  200. if err != nil {
  201. return nil, err
  202. }
  203. return c.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  204. }
  205. func (c *Connector) newClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1beta1.SecretsClient, error) {
  206. storeSpec := store.GetSpec()
  207. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  208. return nil, errors.New(errVaultStore)
  209. }
  210. vaultSpec := storeSpec.Provider.Vault
  211. vStore, cfg, err := c.prepareConfig(kube, corev1, vaultSpec, storeSpec.RetrySettings, namespace, store.GetObjectKind().GroupVersionKind().Kind)
  212. if err != nil {
  213. return nil, err
  214. }
  215. client, err := getVaultClient(c, store, cfg)
  216. if err != nil {
  217. return nil, fmt.Errorf(errVaultClient, err)
  218. }
  219. return c.initClient(ctx, vStore, client, cfg, vaultSpec)
  220. }
  221. func (c *Connector) NewGeneratorClient(ctx context.Context, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, namespace string) (util.Client, error) {
  222. vStore, cfg, err := c.prepareConfig(kube, corev1, vaultSpec, nil, namespace, "Generator")
  223. if err != nil {
  224. return nil, err
  225. }
  226. client, err := c.NewVaultClient(cfg)
  227. if err != nil {
  228. return nil, err
  229. }
  230. _, err = c.initClient(ctx, vStore, client, cfg, vaultSpec)
  231. if err != nil {
  232. return nil, err
  233. }
  234. return client, nil
  235. }
  236. func (c *Connector) prepareConfig(kube kclient.Client, corev1 typedcorev1.CoreV1Interface, vaultSpec *esv1beta1.VaultProvider, retrySettings *esv1beta1.SecretStoreRetrySettings, namespace, storeKind string) (*client, *vault.Config, error) {
  237. vStore := &client{
  238. kube: kube,
  239. corev1: corev1,
  240. store: vaultSpec,
  241. log: logger,
  242. namespace: namespace,
  243. storeKind: storeKind,
  244. }
  245. cfg, err := vStore.newConfig()
  246. if err != nil {
  247. return nil, nil, err
  248. }
  249. // Setup retry options if present
  250. if retrySettings != nil {
  251. if retrySettings.MaxRetries != nil {
  252. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  253. } else {
  254. // By default we rely only on the reconciliation process for retrying
  255. cfg.MaxRetries = 0
  256. }
  257. if retrySettings.RetryInterval != nil {
  258. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  259. if err != nil {
  260. return nil, nil, err
  261. }
  262. cfg.MinRetryWait = retryWait
  263. cfg.MaxRetryWait = retryWait
  264. }
  265. }
  266. return vStore, cfg, nil
  267. }
  268. func (c *Connector) initClient(ctx context.Context, vStore *client, client util.Client, cfg *vault.Config, vaultSpec *esv1beta1.VaultProvider) (esv1beta1.SecretsClient, error) {
  269. if vaultSpec.Namespace != nil {
  270. client.SetNamespace(*vaultSpec.Namespace)
  271. }
  272. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  273. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  274. }
  275. vStore.client = client
  276. vStore.auth = client.Auth()
  277. vStore.logical = client.Logical()
  278. vStore.token = client.AuthToken()
  279. // allow SecretStore controller validation to pass
  280. // when using referent namespace.
  281. if vStore.storeKind == esv1beta1.ClusterSecretStoreKind && vStore.namespace == "" && isReferentSpec(vaultSpec) {
  282. return vStore, nil
  283. }
  284. if err := vStore.setAuth(ctx, cfg); err != nil {
  285. return nil, err
  286. }
  287. return vStore, nil
  288. }
  289. func (c *Connector) ValidateStore(store esv1beta1.GenericStore) error {
  290. if store == nil {
  291. return fmt.Errorf(errInvalidStore)
  292. }
  293. spc := store.GetSpec()
  294. if spc == nil {
  295. return fmt.Errorf(errInvalidStoreSpec)
  296. }
  297. if spc.Provider == nil {
  298. return fmt.Errorf(errInvalidStoreProv)
  299. }
  300. p := spc.Provider.Vault
  301. if p == nil {
  302. return fmt.Errorf(errInvalidVaultProv)
  303. }
  304. if p.Auth.AppRole != nil {
  305. // check SecretRef for valid configuration
  306. if err := utils.ValidateReferentSecretSelector(store, p.Auth.AppRole.SecretRef); err != nil {
  307. return fmt.Errorf(errInvalidAppRoleSec, err)
  308. }
  309. // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
  310. if p.Auth.AppRole.RoleID == "" { // prevents further RoleID tests if .auth.appRole.roleId is given
  311. if p.Auth.AppRole.RoleRef != nil { // check RoleRef for valid configuration
  312. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.AppRole.RoleRef); err != nil {
  313. return fmt.Errorf(errInvalidAppRoleRef, err)
  314. }
  315. } else { // we ran out of ways to get RoleID. return an appropriate error
  316. return fmt.Errorf(errInvalidAppRoleID)
  317. }
  318. }
  319. }
  320. if p.Auth.Cert != nil {
  321. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.ClientCert); err != nil {
  322. return fmt.Errorf(errInvalidClientCert, err)
  323. }
  324. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Cert.SecretRef); err != nil {
  325. return fmt.Errorf(errInvalidCertSec, err)
  326. }
  327. }
  328. if p.Auth.Jwt != nil {
  329. if p.Auth.Jwt.SecretRef != nil {
  330. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Jwt.SecretRef); err != nil {
  331. return fmt.Errorf(errInvalidJwtSec, err)
  332. }
  333. } else if p.Auth.Jwt.KubernetesServiceAccountToken != nil {
  334. if err := utils.ValidateReferentServiceAccountSelector(store, p.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef); err != nil {
  335. return fmt.Errorf(errInvalidJwtK8sSA, err)
  336. }
  337. } else {
  338. return fmt.Errorf(errJwtNoTokenSource)
  339. }
  340. }
  341. if p.Auth.Kubernetes != nil {
  342. if p.Auth.Kubernetes.ServiceAccountRef != nil {
  343. if err := utils.ValidateReferentServiceAccountSelector(store, *p.Auth.Kubernetes.ServiceAccountRef); err != nil {
  344. return fmt.Errorf(errInvalidKubeSA, err)
  345. }
  346. }
  347. if p.Auth.Kubernetes.SecretRef != nil {
  348. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Kubernetes.SecretRef); err != nil {
  349. return fmt.Errorf(errInvalidKubeSec, err)
  350. }
  351. }
  352. }
  353. if p.Auth.Ldap != nil {
  354. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Ldap.SecretRef); err != nil {
  355. return fmt.Errorf(errInvalidLdapSec, err)
  356. }
  357. }
  358. if p.Auth.UserPass != nil {
  359. if err := utils.ValidateReferentSecretSelector(store, p.Auth.UserPass.SecretRef); err != nil {
  360. return fmt.Errorf(errInvalidUserPassSec, err)
  361. }
  362. }
  363. if p.Auth.TokenSecretRef != nil {
  364. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.TokenSecretRef); err != nil {
  365. return fmt.Errorf(errInvalidTokenRef, err)
  366. }
  367. }
  368. if p.Auth.Iam != nil {
  369. if p.Auth.Iam.JWTAuth != nil {
  370. if p.Auth.Iam.JWTAuth.ServiceAccountRef != nil {
  371. if err := utils.ValidateReferentServiceAccountSelector(store, *p.Auth.Iam.JWTAuth.ServiceAccountRef); err != nil {
  372. return fmt.Errorf(errInvalidTokenRef, err)
  373. }
  374. }
  375. }
  376. if p.Auth.Iam.SecretRef != nil {
  377. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Iam.SecretRef.AccessKeyID); err != nil {
  378. return fmt.Errorf(errInvalidTokenRef, err)
  379. }
  380. if err := utils.ValidateReferentSecretSelector(store, p.Auth.Iam.SecretRef.SecretAccessKey); err != nil {
  381. return fmt.Errorf(errInvalidTokenRef, err)
  382. }
  383. if p.Auth.Iam.SecretRef.SessionToken != nil {
  384. if err := utils.ValidateReferentSecretSelector(store, *p.Auth.Iam.SecretRef.SessionToken); err != nil {
  385. return fmt.Errorf(errInvalidTokenRef, err)
  386. }
  387. }
  388. }
  389. }
  390. return nil
  391. }
  392. func (v *client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  393. path := v.buildPath(remoteRef.GetRemoteKey())
  394. metaPath, err := v.buildMetadataPath(remoteRef.GetRemoteKey())
  395. if err != nil {
  396. return err
  397. }
  398. // Retrieve the secret map from vault and convert the secret value in string form.
  399. secretVal, err := v.readSecret(ctx, path, "")
  400. // If error is not of type secret not found, we should error
  401. if err != nil && errors.Is(err, esv1beta1.NoSecretError{}) {
  402. return nil
  403. }
  404. if err != nil {
  405. return err
  406. }
  407. // If Push for a Property, we need to delete the property and update the secret
  408. if remoteRef.GetProperty() != "" {
  409. delete(secretVal, remoteRef.GetProperty())
  410. if len(secretVal) > 0 {
  411. secretToPush := map[string]interface{}{
  412. "data": secretVal,
  413. }
  414. _, err = v.logical.WriteWithContext(ctx, path, secretToPush)
  415. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
  416. return err
  417. }
  418. }
  419. metadata, err := v.readSecretMetadata(ctx, remoteRef.GetRemoteKey())
  420. if err != nil {
  421. return err
  422. }
  423. manager, ok := metadata["managed-by"]
  424. if !ok || manager != "external-secrets" {
  425. return nil
  426. }
  427. _, err = v.logical.DeleteWithContext(ctx, path)
  428. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
  429. if err != nil {
  430. return fmt.Errorf("could not delete secret %v: %w", remoteRef.GetRemoteKey(), err)
  431. }
  432. _, err = v.logical.DeleteWithContext(ctx, metaPath)
  433. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultDeleteSecret, err)
  434. if err != nil {
  435. return fmt.Errorf("could not delete secret metadata %v: %w", remoteRef.GetRemoteKey(), err)
  436. }
  437. return nil
  438. }
  439. func (v *client) PushSecret(ctx context.Context, value []byte, _ *apiextensionsv1.JSON, remoteRef esv1beta1.PushRemoteRef) error {
  440. label := map[string]interface{}{
  441. "custom_metadata": map[string]string{
  442. "managed-by": "external-secrets",
  443. },
  444. }
  445. secretVal := make(map[string]interface{})
  446. path := v.buildPath(remoteRef.GetRemoteKey())
  447. metaPath, err := v.buildMetadataPath(remoteRef.GetRemoteKey())
  448. if err != nil {
  449. return err
  450. }
  451. // Retrieve the secret map from vault and convert the secret value in string form.
  452. vaultSecret, err := v.readSecret(ctx, path, "")
  453. // If error is not of type secret not found, we should error
  454. if err != nil && !errors.Is(err, esv1beta1.NoSecretError{}) {
  455. return err
  456. }
  457. // If the secret exists (err == nil), we should check if it is managed by external-secrets
  458. if err == nil {
  459. metadata, err := v.readSecretMetadata(ctx, remoteRef.GetRemoteKey())
  460. if err != nil {
  461. return err
  462. }
  463. manager, ok := metadata["managed-by"]
  464. if !ok || manager != "external-secrets" {
  465. return fmt.Errorf("secret not managed by external-secrets")
  466. }
  467. }
  468. buf := &bytes.Buffer{}
  469. enc := json.NewEncoder(buf)
  470. enc.SetEscapeHTML(false)
  471. err = enc.Encode(vaultSecret)
  472. if err != nil {
  473. return fmt.Errorf("error encoding vault secret: %w", err)
  474. }
  475. vaultSecretValue := bytes.TrimSpace(buf.Bytes())
  476. if err != nil {
  477. return fmt.Errorf("error marshaling vault secret: %w", err)
  478. }
  479. if bytes.Equal(vaultSecretValue, value) {
  480. return nil
  481. }
  482. // If a Push of a property only, we should merge and add/update the property
  483. if remoteRef.GetProperty() != "" {
  484. if _, ok := vaultSecret[remoteRef.GetProperty()]; ok {
  485. d := vaultSecret[remoteRef.GetProperty()].(string)
  486. if err != nil {
  487. return fmt.Errorf("error marshaling vault secret: %w", err)
  488. }
  489. // If the property has the same value, don't update the secret
  490. if bytes.Equal([]byte(d), value) {
  491. return nil
  492. }
  493. }
  494. for k, v := range vaultSecret {
  495. secretVal[k] = v
  496. }
  497. // Secret got from vault is already on map[string]string format
  498. secretVal[remoteRef.GetProperty()] = string(value)
  499. } else {
  500. err = json.Unmarshal(value, &secretVal)
  501. if err != nil {
  502. return fmt.Errorf("error unmarshalling vault secret: %w", err)
  503. }
  504. }
  505. secretToPush := map[string]interface{}{
  506. "data": secretVal,
  507. }
  508. if err != nil {
  509. return fmt.Errorf("failed to convert value to a valid JSON: %w", err)
  510. }
  511. _, err = v.logical.WriteWithContext(ctx, metaPath, label)
  512. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
  513. if err != nil {
  514. return err
  515. }
  516. // Otherwise, create or update the version.
  517. _, err = v.logical.WriteWithContext(ctx, path, secretToPush)
  518. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
  519. return err
  520. }
  521. // GetAllSecrets gets multiple secrets from the provider and loads into a kubernetes secret.
  522. // First load all secrets from secretStore path configuration
  523. // Then, gets secrets from a matching name or matching custom_metadata.
  524. func (v *client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  525. if v.store.Version == esv1beta1.VaultKVStoreV1 {
  526. return nil, errors.New(errUnsupportedKvVersion)
  527. }
  528. searchPath := ""
  529. if ref.Path != nil {
  530. searchPath = *ref.Path + "/"
  531. }
  532. potentialSecrets, err := v.listSecrets(ctx, searchPath)
  533. if err != nil {
  534. return nil, err
  535. }
  536. if ref.Name != nil {
  537. return v.findSecretsFromName(ctx, potentialSecrets, *ref.Name)
  538. }
  539. return v.findSecretsFromTags(ctx, potentialSecrets, ref.Tags)
  540. }
  541. func (v *client) findSecretsFromTags(ctx context.Context, candidates []string, tags map[string]string) (map[string][]byte, error) {
  542. secrets := make(map[string][]byte)
  543. for _, name := range candidates {
  544. match := true
  545. metadata, err := v.readSecretMetadata(ctx, name)
  546. if err != nil {
  547. return nil, err
  548. }
  549. for tk, tv := range tags {
  550. p, ok := metadata[tk]
  551. if !ok || p != tv {
  552. match = false
  553. break
  554. }
  555. }
  556. if match {
  557. secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  558. if errors.Is(err, esv1beta1.NoSecretError{}) {
  559. continue
  560. }
  561. if err != nil {
  562. return nil, err
  563. }
  564. if secret != nil {
  565. secrets[name] = secret
  566. }
  567. }
  568. }
  569. return secrets, nil
  570. }
  571. func (v *client) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName) (map[string][]byte, error) {
  572. secrets := make(map[string][]byte)
  573. matcher, err := find.New(ref)
  574. if err != nil {
  575. return nil, err
  576. }
  577. for _, name := range candidates {
  578. ok := matcher.MatchName(name)
  579. if ok {
  580. secret, err := v.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  581. if errors.Is(err, esv1beta1.NoSecretError{}) {
  582. continue
  583. }
  584. if err != nil {
  585. return nil, err
  586. }
  587. if secret != nil {
  588. secrets[name] = secret
  589. }
  590. }
  591. }
  592. return secrets, nil
  593. }
  594. func (v *client) listSecrets(ctx context.Context, path string) ([]string, error) {
  595. secrets := make([]string, 0)
  596. url, err := v.buildMetadataPath(path)
  597. if err != nil {
  598. return nil, err
  599. }
  600. secret, err := v.logical.ListWithContext(ctx, url)
  601. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultListSecrets, err)
  602. if err != nil {
  603. return nil, fmt.Errorf(errReadSecret, err)
  604. }
  605. if secret == nil {
  606. return nil, fmt.Errorf("provided path %v does not contain any secrets", url)
  607. }
  608. t, ok := secret.Data["keys"]
  609. if !ok {
  610. return nil, nil
  611. }
  612. paths := t.([]interface{})
  613. for _, p := range paths {
  614. strPath := p.(string)
  615. fullPath := path + strPath // because path always ends with a /
  616. if path == "" {
  617. fullPath = strPath
  618. }
  619. // Recurrently find secrets
  620. if !strings.HasSuffix(p.(string), "/") {
  621. secrets = append(secrets, fullPath)
  622. } else {
  623. partial, err := v.listSecrets(ctx, fullPath)
  624. if err != nil {
  625. return nil, err
  626. }
  627. secrets = append(secrets, partial...)
  628. }
  629. }
  630. return secrets, nil
  631. }
  632. func (v *client) readSecretMetadata(ctx context.Context, path string) (map[string]string, error) {
  633. metadata := make(map[string]string)
  634. url, err := v.buildMetadataPath(path)
  635. if err != nil {
  636. return nil, err
  637. }
  638. secret, err := v.logical.ReadWithDataWithContext(ctx, url, nil)
  639. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultReadSecretData, err)
  640. if err != nil {
  641. return nil, fmt.Errorf(errReadSecret, err)
  642. }
  643. if secret == nil {
  644. return nil, errors.New(errNotFound)
  645. }
  646. t, ok := secret.Data["custom_metadata"]
  647. if !ok {
  648. return nil, nil
  649. }
  650. d, ok := t.(map[string]interface{})
  651. if !ok {
  652. return metadata, nil
  653. }
  654. for k, v := range d {
  655. metadata[k] = v.(string)
  656. }
  657. return metadata, nil
  658. }
  659. // GetSecret supports two types:
  660. // 1. get the full secret as json-encoded value
  661. // by leaving the ref.Property empty.
  662. // 2. get a key from the secret.
  663. // Nested values are supported by specifying a gjson expression
  664. func (v *client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  665. var data map[string]interface{}
  666. var err error
  667. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  668. if v.store.Version == esv1beta1.VaultKVStoreV1 {
  669. return nil, errors.New(errUnsupportedMetadataKvVersion)
  670. }
  671. metadata, err := v.readSecretMetadata(ctx, ref.Key)
  672. if err != nil {
  673. return nil, err
  674. }
  675. if len(metadata) == 0 {
  676. return nil, nil
  677. }
  678. data = make(map[string]interface{}, len(metadata))
  679. for k, v := range metadata {
  680. data[k] = v
  681. }
  682. } else {
  683. data, err = v.readSecret(ctx, ref.Key, ref.Version)
  684. if err != nil {
  685. return nil, err
  686. }
  687. }
  688. // Return nil if secret value is null
  689. if data == nil {
  690. return nil, esv1beta1.NoSecretError{}
  691. }
  692. jsonStr, err := json.Marshal(data)
  693. if err != nil {
  694. return nil, err
  695. }
  696. // (1): return raw json if no property is defined
  697. if ref.Property == "" {
  698. return jsonStr, nil
  699. }
  700. // For backwards compatibility we want the
  701. // actual keys to take precedence over gjson syntax
  702. // (2): extract key from secret with property
  703. if _, ok := data[ref.Property]; ok {
  704. return GetTypedKey(data, ref.Property)
  705. }
  706. // (3): extract key from secret using gjson
  707. val := gjson.Get(string(jsonStr), ref.Property)
  708. if !val.Exists() {
  709. return nil, fmt.Errorf(errSecretKeyFmt, ref.Property)
  710. }
  711. return []byte(val.String()), nil
  712. }
  713. // GetSecretMap supports two modes of operation:
  714. // 1. get the full secret from the vault data payload (by leaving .property empty).
  715. // 2. extract key/value pairs from a (nested) object.
  716. func (v *client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  717. data, err := v.GetSecret(ctx, ref)
  718. if err != nil {
  719. return nil, err
  720. }
  721. var secretData map[string]interface{}
  722. err = json.Unmarshal(data, &secretData)
  723. if err != nil {
  724. return nil, err
  725. }
  726. byteMap := make(map[string][]byte, len(secretData))
  727. for k := range secretData {
  728. byteMap[k], err = GetTypedKey(secretData, k)
  729. if err != nil {
  730. return nil, err
  731. }
  732. }
  733. return byteMap, nil
  734. }
  735. func GetTypedKey(data map[string]interface{}, key string) ([]byte, error) {
  736. v, ok := data[key]
  737. if !ok {
  738. return nil, fmt.Errorf(errUnexpectedKey, key)
  739. }
  740. switch t := v.(type) {
  741. case string:
  742. return []byte(t), nil
  743. case map[string]interface{}:
  744. return json.Marshal(t)
  745. case []string:
  746. return []byte(strings.Join(t, "\n")), nil
  747. case []byte:
  748. return t, nil
  749. // also covers int and float32 due to json.Marshal
  750. case float64:
  751. return []byte(strconv.FormatFloat(t, 'f', -1, 64)), nil
  752. case json.Number:
  753. return []byte(t.String()), nil
  754. case []interface{}:
  755. return json.Marshal(t)
  756. case bool:
  757. return []byte(strconv.FormatBool(t)), nil
  758. case nil:
  759. return []byte(nil), nil
  760. default:
  761. return nil, fmt.Errorf(errSecretFormat, key, reflect.TypeOf(t))
  762. }
  763. }
  764. func (v *client) Close(ctx context.Context) error {
  765. // Revoke the token if we have one set, it wasn't sourced from a TokenSecretRef,
  766. // and token caching isn't enabled
  767. if !enableCache && v.client.Token() != "" && v.store.Auth.TokenSecretRef == nil {
  768. err := revokeTokenIfValid(ctx, v.client)
  769. if err != nil {
  770. return err
  771. }
  772. }
  773. return nil
  774. }
  775. func isReferentSpec(prov *esv1beta1.VaultProvider) bool {
  776. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  777. return true
  778. }
  779. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  780. return true
  781. }
  782. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  783. return true
  784. }
  785. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  786. return true
  787. }
  788. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  789. return true
  790. }
  791. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  792. return true
  793. }
  794. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  795. return true
  796. }
  797. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  798. return true
  799. }
  800. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  801. return true
  802. }
  803. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  804. return true
  805. }
  806. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  807. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  808. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  809. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  810. return true
  811. }
  812. return false
  813. }
  814. func (v *client) Validate() (esv1beta1.ValidationResult, error) {
  815. // when using referent namespace we can not validate the token
  816. // because the namespace is not known yet when Validate() is called
  817. // from the SecretStore controller.
  818. if v.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(v.store) {
  819. return esv1beta1.ValidationResultUnknown, nil
  820. }
  821. _, err := checkToken(context.Background(), v.token)
  822. if err != nil {
  823. return esv1beta1.ValidationResultError, fmt.Errorf(errInvalidCredentials, err)
  824. }
  825. return esv1beta1.ValidationResultReady, nil
  826. }
  827. func (v *client) buildMetadataPath(path string) (string, error) {
  828. var url string
  829. if v.store.Path == nil && !strings.Contains(path, "data") {
  830. return "", fmt.Errorf(errPathInvalid)
  831. }
  832. if v.store.Path == nil {
  833. path = strings.Replace(path, "data", "metadata", 1)
  834. url = path
  835. } else {
  836. url = fmt.Sprintf("%s/metadata/%s", *v.store.Path, path)
  837. }
  838. return url, nil
  839. }
  840. /*
  841. buildPath is a helper method to build the vault equivalent path
  842. from ExternalSecrets and SecretStore manifests. the path build logic
  843. varies depending on the SecretStore KV version:
  844. Example inputs/outputs:
  845. # simple build:
  846. kv version == "v2":
  847. provider_path: "secret/path"
  848. input: "foo"
  849. output: "secret/path/data/foo" # provider_path and data are prepended
  850. kv version == "v1":
  851. provider_path: "secret/path"
  852. input: "foo"
  853. output: "secret/path/foo" # provider_path is prepended
  854. # inheriting paths:
  855. kv version == "v2":
  856. provider_path: "secret/path"
  857. input: "secret/path/foo"
  858. output: "secret/path/data/foo" #data is prepended
  859. kv version == "v2":
  860. provider_path: "secret/path"
  861. input: "secret/path/data/foo"
  862. output: "secret/path/data/foo" #noop
  863. kv version == "v1":
  864. provider_path: "secret/path"
  865. input: "secret/path/foo"
  866. output: "secret/path/foo" #noop
  867. # provider path not defined:
  868. kv version == "v2":
  869. provider_path: nil
  870. input: "secret/path/foo"
  871. output: "secret/data/path/foo" # data is prepended to secret/
  872. kv version == "v2":
  873. provider_path: nil
  874. input: "secret/path/data/foo"
  875. output: "secret/path/data/foo" #noop
  876. kv version == "v1":
  877. provider_path: nil
  878. input: "secret/path/foo"
  879. output: "secret/path/foo" #noop
  880. */
  881. func (v *client) buildPath(path string) string {
  882. optionalMount := v.store.Path
  883. out := path
  884. // if optionalMount is Set, remove it from path if its there
  885. if optionalMount != nil {
  886. cut := *optionalMount + "/"
  887. if strings.HasPrefix(out, cut) {
  888. // This current logic induces a bug when the actual secret resides on same path names as the mount path.
  889. _, out, _ = strings.Cut(out, cut)
  890. // if data succeeds optionalMount on v2 store, we should remove it as well
  891. if strings.HasPrefix(out, "data/") && v.store.Version == esv1beta1.VaultKVStoreV2 {
  892. _, out, _ = strings.Cut(out, "data/")
  893. }
  894. }
  895. buildPath := strings.Split(out, "/")
  896. buildMount := strings.Split(*optionalMount, "/")
  897. if v.store.Version == esv1beta1.VaultKVStoreV2 {
  898. buildMount = append(buildMount, "data")
  899. }
  900. buildMount = append(buildMount, buildPath...)
  901. out = strings.Join(buildMount, "/")
  902. return out
  903. }
  904. if !strings.Contains(out, "/data/") && v.store.Version == esv1beta1.VaultKVStoreV2 {
  905. buildPath := strings.Split(out, "/")
  906. buildMount := []string{buildPath[0], "data"}
  907. buildMount = append(buildMount, buildPath[1:]...)
  908. out = strings.Join(buildMount, "/")
  909. return out
  910. }
  911. return out
  912. }
  913. func (v *client) readSecret(ctx context.Context, path, version string) (map[string]interface{}, error) {
  914. dataPath := v.buildPath(path)
  915. // path formated according to vault docs for v1 and v2 API
  916. // v1: https://www.vaultproject.io/api-docs/secret/kv/kv-v1#read-secret
  917. // v2: https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  918. var params map[string][]string
  919. if version != "" {
  920. params = make(map[string][]string)
  921. params["version"] = []string{version}
  922. }
  923. vaultSecret, err := v.logical.ReadWithDataWithContext(ctx, dataPath, params)
  924. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultReadSecretData, err)
  925. if err != nil {
  926. return nil, fmt.Errorf(errReadSecret, err)
  927. }
  928. if vaultSecret == nil {
  929. return nil, esv1beta1.NoSecretError{}
  930. }
  931. secretData := vaultSecret.Data
  932. if v.store.Version == esv1beta1.VaultKVStoreV2 {
  933. // Vault KV2 has data embedded within sub-field
  934. // reference - https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version
  935. dataInt, ok := vaultSecret.Data["data"]
  936. if !ok {
  937. return nil, errors.New(errDataField)
  938. }
  939. if dataInt == nil {
  940. return nil, esv1beta1.NoSecretError{}
  941. }
  942. secretData, ok = dataInt.(map[string]interface{})
  943. if !ok {
  944. return nil, errors.New(errJSONUnmarshall)
  945. }
  946. }
  947. return secretData, nil
  948. }
  949. func (v *client) newConfig() (*vault.Config, error) {
  950. cfg := vault.DefaultConfig()
  951. cfg.Address = v.store.Server
  952. if len(v.store.CABundle) == 0 && v.store.CAProvider == nil {
  953. return cfg, nil
  954. }
  955. caCertPool := x509.NewCertPool()
  956. if len(v.store.CABundle) > 0 {
  957. ok := caCertPool.AppendCertsFromPEM(v.store.CABundle)
  958. if !ok {
  959. return nil, fmt.Errorf(errVaultCert, errors.New("failed to parse certificates from CertPool"))
  960. }
  961. }
  962. if v.store.CAProvider != nil && v.storeKind == esv1beta1.ClusterSecretStoreKind && v.store.CAProvider.Namespace == nil {
  963. return nil, errors.New(errCANamespace)
  964. }
  965. if v.store.CAProvider != nil {
  966. var cert []byte
  967. var err error
  968. switch v.store.CAProvider.Type {
  969. case esv1beta1.CAProviderTypeSecret:
  970. cert, err = getCertFromSecret(v)
  971. case esv1beta1.CAProviderTypeConfigMap:
  972. cert, err = getCertFromConfigMap(v)
  973. default:
  974. return nil, errors.New(errUnknownCAProvider)
  975. }
  976. if err != nil {
  977. return nil, err
  978. }
  979. ok := caCertPool.AppendCertsFromPEM(cert)
  980. if !ok {
  981. return nil, fmt.Errorf(errVaultCert, errors.New("failed to parse certificates from CertPool"))
  982. }
  983. }
  984. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  985. transport.TLSClientConfig.RootCAs = caCertPool
  986. }
  987. // If either read-after-write consistency feature is enabled, enable ReadYourWrites
  988. cfg.ReadYourWrites = v.store.ReadYourWrites || v.store.ForwardInconsistent
  989. return cfg, nil
  990. }
  991. func getCertFromSecret(v *client) ([]byte, error) {
  992. secretRef := esmeta.SecretKeySelector{
  993. Name: v.store.CAProvider.Name,
  994. Key: v.store.CAProvider.Key,
  995. }
  996. if v.store.CAProvider.Namespace != nil {
  997. secretRef.Namespace = v.store.CAProvider.Namespace
  998. }
  999. ctx := context.Background()
  1000. res, err := v.secretKeyRef(ctx, &secretRef)
  1001. if err != nil {
  1002. return nil, fmt.Errorf(errVaultCert, err)
  1003. }
  1004. return []byte(res), nil
  1005. }
  1006. func getCertFromConfigMap(v *client) ([]byte, error) {
  1007. objKey := types.NamespacedName{
  1008. Name: v.store.CAProvider.Name,
  1009. }
  1010. if v.store.CAProvider.Namespace != nil {
  1011. objKey.Namespace = *v.store.CAProvider.Namespace
  1012. }
  1013. configMapRef := &corev1.ConfigMap{}
  1014. ctx := context.Background()
  1015. err := v.kube.Get(ctx, objKey, configMapRef)
  1016. if err != nil {
  1017. return nil, fmt.Errorf(errVaultCert, err)
  1018. }
  1019. val, ok := configMapRef.Data[v.store.CAProvider.Key]
  1020. if !ok {
  1021. return nil, fmt.Errorf(errConfigMapFmt, v.store.CAProvider.Key)
  1022. }
  1023. return []byte(val), nil
  1024. }
  1025. /*
  1026. setAuth gets a new token using the configured mechanism.
  1027. If there's already a valid token, does nothing.
  1028. */
  1029. func (v *client) setAuth(ctx context.Context, cfg *vault.Config) error {
  1030. tokenExists := false
  1031. var err error
  1032. if v.client.Token() != "" {
  1033. tokenExists, err = checkToken(ctx, v.token)
  1034. }
  1035. if tokenExists {
  1036. v.log.V(1).Info("Re-using existing token")
  1037. return err
  1038. }
  1039. tokenExists, err = setSecretKeyToken(ctx, v)
  1040. if tokenExists {
  1041. v.log.V(1).Info("Set token from secret")
  1042. return err
  1043. }
  1044. tokenExists, err = setAppRoleToken(ctx, v)
  1045. if tokenExists {
  1046. v.log.V(1).Info("Retrieved new token using AppRole auth")
  1047. return err
  1048. }
  1049. tokenExists, err = setKubernetesAuthToken(ctx, v)
  1050. if tokenExists {
  1051. v.log.V(1).Info("Retrieved new token using Kubernetes auth")
  1052. return err
  1053. }
  1054. tokenExists, err = setLdapAuthToken(ctx, v)
  1055. if tokenExists {
  1056. v.log.V(1).Info("Retrieved new token using LDAP auth")
  1057. return err
  1058. }
  1059. tokenExists, err = setUserPassAuthToken(ctx, v)
  1060. if tokenExists {
  1061. v.log.V(1).Info("Retrieved new token using userPass auth")
  1062. return err
  1063. }
  1064. tokenExists, err = setJwtAuthToken(ctx, v)
  1065. if tokenExists {
  1066. v.log.V(1).Info("Retrieved new token using JWT auth")
  1067. return err
  1068. }
  1069. tokenExists, err = setCertAuthToken(ctx, v, cfg)
  1070. if tokenExists {
  1071. v.log.V(1).Info("Retrieved new token using certificate auth")
  1072. return err
  1073. }
  1074. tokenExists, err = setIamAuthToken(ctx, v, vaultiamauth.DefaultJWTProvider, vaultiamauth.DefaultSTSProvider)
  1075. if tokenExists {
  1076. v.log.V(1).Info("Retrieved new token using IAM auth")
  1077. return err
  1078. }
  1079. return errors.New(errAuthFormat)
  1080. }
  1081. func setSecretKeyToken(ctx context.Context, v *client) (bool, error) {
  1082. tokenRef := v.store.Auth.TokenSecretRef
  1083. if tokenRef != nil {
  1084. token, err := v.secretKeyRef(ctx, tokenRef)
  1085. if err != nil {
  1086. return true, err
  1087. }
  1088. v.client.SetToken(token)
  1089. return true, nil
  1090. }
  1091. return false, nil
  1092. }
  1093. func setAppRoleToken(ctx context.Context, v *client) (bool, error) {
  1094. appRole := v.store.Auth.AppRole
  1095. if appRole != nil {
  1096. err := v.requestTokenWithAppRoleRef(ctx, appRole)
  1097. if err != nil {
  1098. return true, err
  1099. }
  1100. return true, nil
  1101. }
  1102. return false, nil
  1103. }
  1104. func setKubernetesAuthToken(ctx context.Context, v *client) (bool, error) {
  1105. kubernetesAuth := v.store.Auth.Kubernetes
  1106. if kubernetesAuth != nil {
  1107. err := v.requestTokenWithKubernetesAuth(ctx, kubernetesAuth)
  1108. if err != nil {
  1109. return true, err
  1110. }
  1111. return true, nil
  1112. }
  1113. return false, nil
  1114. }
  1115. func setLdapAuthToken(ctx context.Context, v *client) (bool, error) {
  1116. ldapAuth := v.store.Auth.Ldap
  1117. if ldapAuth != nil {
  1118. err := v.requestTokenWithLdapAuth(ctx, ldapAuth)
  1119. if err != nil {
  1120. return true, err
  1121. }
  1122. return true, nil
  1123. }
  1124. return false, nil
  1125. }
  1126. func setUserPassAuthToken(ctx context.Context, v *client) (bool, error) {
  1127. userPassAuth := v.store.Auth.UserPass
  1128. if userPassAuth != nil {
  1129. err := v.requestTokenWithUserPassAuth(ctx, userPassAuth)
  1130. if err != nil {
  1131. return true, err
  1132. }
  1133. return true, nil
  1134. }
  1135. return false, nil
  1136. }
  1137. func setJwtAuthToken(ctx context.Context, v *client) (bool, error) {
  1138. jwtAuth := v.store.Auth.Jwt
  1139. if jwtAuth != nil {
  1140. err := v.requestTokenWithJwtAuth(ctx, jwtAuth)
  1141. if err != nil {
  1142. return true, err
  1143. }
  1144. return true, nil
  1145. }
  1146. return false, nil
  1147. }
  1148. func setCertAuthToken(ctx context.Context, v *client, cfg *vault.Config) (bool, error) {
  1149. certAuth := v.store.Auth.Cert
  1150. if certAuth != nil {
  1151. err := v.requestTokenWithCertAuth(ctx, certAuth, cfg)
  1152. if err != nil {
  1153. return true, err
  1154. }
  1155. return true, nil
  1156. }
  1157. return false, nil
  1158. }
  1159. func setIamAuthToken(ctx context.Context, v *client, jwtProvider util.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) (bool, error) {
  1160. iamAuth := v.store.Auth.Iam
  1161. isClusterKind := v.storeKind == esv1beta1.ClusterSecretStoreKind
  1162. if iamAuth != nil {
  1163. err := v.requestTokenWithIamAuth(ctx, iamAuth, isClusterKind, v.kube, v.namespace, jwtProvider, assumeRoler)
  1164. if err != nil {
  1165. return true, err
  1166. }
  1167. return true, nil
  1168. }
  1169. return false, nil
  1170. }
  1171. func (v *client) secretKeyRefForServiceAccount(ctx context.Context, serviceAccountRef *esmeta.ServiceAccountSelector) (string, error) {
  1172. serviceAccount := &corev1.ServiceAccount{}
  1173. ref := types.NamespacedName{
  1174. Namespace: v.namespace,
  1175. Name: serviceAccountRef.Name,
  1176. }
  1177. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  1178. (serviceAccountRef.Namespace != nil) {
  1179. ref.Namespace = *serviceAccountRef.Namespace
  1180. }
  1181. err := v.kube.Get(ctx, ref, serviceAccount)
  1182. if err != nil {
  1183. return "", fmt.Errorf(errGetKubeSA, ref.Name, err)
  1184. }
  1185. if len(serviceAccount.Secrets) == 0 {
  1186. return "", fmt.Errorf(errGetKubeSASecrets, ref.Name)
  1187. }
  1188. for _, tokenRef := range serviceAccount.Secrets {
  1189. retval, err := v.secretKeyRef(ctx, &esmeta.SecretKeySelector{
  1190. Name: tokenRef.Name,
  1191. Namespace: &ref.Namespace,
  1192. Key: "token",
  1193. })
  1194. if err != nil {
  1195. continue
  1196. }
  1197. return retval, nil
  1198. }
  1199. return "", fmt.Errorf(errGetKubeSANoToken, ref.Name)
  1200. }
  1201. func (v *client) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  1202. secret := &corev1.Secret{}
  1203. ref := types.NamespacedName{
  1204. Namespace: v.namespace,
  1205. Name: secretRef.Name,
  1206. }
  1207. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  1208. (secretRef.Namespace != nil) {
  1209. ref.Namespace = *secretRef.Namespace
  1210. }
  1211. err := v.kube.Get(ctx, ref, secret)
  1212. if err != nil {
  1213. return "", fmt.Errorf(errGetKubeSecret, ref.Name, err)
  1214. }
  1215. keyBytes, ok := secret.Data[secretRef.Key]
  1216. if !ok {
  1217. return "", fmt.Errorf(errSecretKeyFmt, secretRef.Key)
  1218. }
  1219. value := string(keyBytes)
  1220. valueStr := strings.TrimSpace(value)
  1221. return valueStr, nil
  1222. }
  1223. func (v *client) serviceAccountToken(ctx context.Context, serviceAccountRef esmeta.ServiceAccountSelector, additionalAud []string, expirationSeconds int64) (string, error) {
  1224. audiences := serviceAccountRef.Audiences
  1225. if len(additionalAud) > 0 {
  1226. audiences = append(audiences, additionalAud...)
  1227. }
  1228. tokenRequest := &authenticationv1.TokenRequest{
  1229. ObjectMeta: metav1.ObjectMeta{
  1230. Namespace: v.namespace,
  1231. },
  1232. Spec: authenticationv1.TokenRequestSpec{
  1233. Audiences: audiences,
  1234. ExpirationSeconds: &expirationSeconds,
  1235. },
  1236. }
  1237. if (v.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  1238. (serviceAccountRef.Namespace != nil) {
  1239. tokenRequest.Namespace = *serviceAccountRef.Namespace
  1240. }
  1241. tokenResponse, err := v.corev1.ServiceAccounts(tokenRequest.Namespace).CreateToken(ctx, serviceAccountRef.Name, tokenRequest, metav1.CreateOptions{})
  1242. if err != nil {
  1243. return "", fmt.Errorf(errGetKubeSATokenRequest, serviceAccountRef.Name, err)
  1244. }
  1245. return tokenResponse.Status.Token, nil
  1246. }
  1247. // checkToken does a lookup and checks if the provided token exists.
  1248. func checkToken(ctx context.Context, token util.Token) (bool, error) {
  1249. // https://www.vaultproject.io/api-docs/auth/token#lookup-a-token-self
  1250. resp, err := token.LookupSelfWithContext(ctx)
  1251. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLookupSelf, err)
  1252. if err != nil {
  1253. return false, err
  1254. }
  1255. t, ok := resp.Data["type"]
  1256. if !ok {
  1257. return false, fmt.Errorf("could not assert token type")
  1258. }
  1259. tokenType := t.(string)
  1260. if tokenType == "batch" {
  1261. return false, nil
  1262. }
  1263. return true, nil
  1264. }
  1265. func revokeTokenIfValid(ctx context.Context, client util.Client) error {
  1266. valid, err := checkToken(ctx, client.AuthToken())
  1267. if err != nil {
  1268. return fmt.Errorf(errVaultRevokeToken, err)
  1269. }
  1270. if valid {
  1271. err = client.AuthToken().RevokeSelfWithContext(ctx, client.Token())
  1272. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultRevokeSelf, err)
  1273. if err != nil {
  1274. return fmt.Errorf(errVaultRevokeToken, err)
  1275. }
  1276. client.ClearToken()
  1277. }
  1278. return nil
  1279. }
  1280. func (v *client) requestTokenWithAppRoleRef(ctx context.Context, appRole *esv1beta1.VaultAppRole) error {
  1281. var err error
  1282. var roleID string // becomes the RoleID used to authenticate with HashiCorp Vault
  1283. // prefer .auth.appRole.roleId, fallback to .auth.appRole.roleRef, give up after that.
  1284. if appRole.RoleID != "" { // use roleId from CRD, if configured
  1285. roleID = strings.TrimSpace(appRole.RoleID)
  1286. } else if appRole.RoleRef != nil { // use RoleID from Secret, if configured
  1287. roleID, err = v.secretKeyRef(ctx, appRole.RoleRef)
  1288. if err != nil {
  1289. return err
  1290. }
  1291. } else { // we ran out of ways to get RoleID. return an appropriate error
  1292. return fmt.Errorf(errInvalidAppRoleID)
  1293. }
  1294. secretID, err := v.secretKeyRef(ctx, &appRole.SecretRef)
  1295. if err != nil {
  1296. return err
  1297. }
  1298. secret := approle.SecretID{FromString: secretID}
  1299. appRoleClient, err := approle.NewAppRoleAuth(roleID, &secret, approle.WithMountPath(appRole.Path))
  1300. if err != nil {
  1301. return err
  1302. }
  1303. _, err = v.auth.Login(ctx, appRoleClient)
  1304. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  1305. if err != nil {
  1306. return err
  1307. }
  1308. return nil
  1309. }
  1310. func (v *client) requestTokenWithKubernetesAuth(ctx context.Context, kubernetesAuth *esv1beta1.VaultKubernetesAuth) error {
  1311. jwtString, err := getJwtString(ctx, v, kubernetesAuth)
  1312. if err != nil {
  1313. return err
  1314. }
  1315. k, err := authkubernetes.NewKubernetesAuth(kubernetesAuth.Role, authkubernetes.WithServiceAccountToken(jwtString), authkubernetes.WithMountPath(kubernetesAuth.Path))
  1316. if err != nil {
  1317. return err
  1318. }
  1319. _, err = v.auth.Login(ctx, k)
  1320. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  1321. if err != nil {
  1322. return err
  1323. }
  1324. return nil
  1325. }
  1326. func getJwtString(ctx context.Context, v *client, kubernetesAuth *esv1beta1.VaultKubernetesAuth) (string, error) {
  1327. if kubernetesAuth.ServiceAccountRef != nil {
  1328. // Kubernetes <v1.24 fetch token via ServiceAccount.Secrets[]
  1329. // this behavior was removed in v1.24 and we must use TokenRequest API (see below)
  1330. jwt, err := v.secretKeyRefForServiceAccount(ctx, kubernetesAuth.ServiceAccountRef)
  1331. if jwt != "" {
  1332. return jwt, err
  1333. }
  1334. if err != nil {
  1335. v.log.V(1).Info("unable to fetch jwt from service account secret, trying service account token next")
  1336. }
  1337. // Kubernetes >=v1.24: fetch token via TokenRequest API
  1338. // note: this is a massive change from vault perspective: the `iss` claim will very likely change.
  1339. // Vault 1.9 deprecated issuer validation by default, and authentication with Vault clusters <1.9 will likely fail.
  1340. jwt, err = v.serviceAccountToken(ctx, *kubernetesAuth.ServiceAccountRef, nil, 600)
  1341. if err != nil {
  1342. return "", err
  1343. }
  1344. return jwt, nil
  1345. } else if kubernetesAuth.SecretRef != nil {
  1346. tokenRef := kubernetesAuth.SecretRef
  1347. if tokenRef.Key == "" {
  1348. tokenRef = kubernetesAuth.SecretRef.DeepCopy()
  1349. tokenRef.Key = "token"
  1350. }
  1351. jwt, err := v.secretKeyRef(ctx, tokenRef)
  1352. if err != nil {
  1353. return "", err
  1354. }
  1355. return jwt, nil
  1356. } else {
  1357. // Kubernetes authentication is specified, but without a referenced
  1358. // Kubernetes secret. We check if the file path for in-cluster service account
  1359. // exists and attempt to use the token for Vault Kubernetes auth.
  1360. if _, err := os.Stat(serviceAccTokenPath); err != nil {
  1361. return "", fmt.Errorf(errServiceAccount, err)
  1362. }
  1363. jwtByte, err := os.ReadFile(serviceAccTokenPath)
  1364. if err != nil {
  1365. return "", fmt.Errorf(errServiceAccount, err)
  1366. }
  1367. return string(jwtByte), nil
  1368. }
  1369. }
  1370. func (v *client) requestTokenWithLdapAuth(ctx context.Context, ldapAuth *esv1beta1.VaultLdapAuth) error {
  1371. username := strings.TrimSpace(ldapAuth.Username)
  1372. password, err := v.secretKeyRef(ctx, &ldapAuth.SecretRef)
  1373. if err != nil {
  1374. return err
  1375. }
  1376. pass := authldap.Password{FromString: password}
  1377. l, err := authldap.NewLDAPAuth(username, &pass, authldap.WithMountPath(ldapAuth.Path))
  1378. if err != nil {
  1379. return err
  1380. }
  1381. _, err = v.auth.Login(ctx, l)
  1382. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  1383. if err != nil {
  1384. return err
  1385. }
  1386. return nil
  1387. }
  1388. func (v *client) requestTokenWithUserPassAuth(ctx context.Context, userPassAuth *esv1beta1.VaultUserPassAuth) error {
  1389. username := strings.TrimSpace(userPassAuth.Username)
  1390. password, err := v.secretKeyRef(ctx, &userPassAuth.SecretRef)
  1391. if err != nil {
  1392. return err
  1393. }
  1394. pass := authuserpass.Password{FromString: password}
  1395. l, err := authuserpass.NewUserpassAuth(username, &pass, authuserpass.WithMountPath(userPassAuth.Path))
  1396. if err != nil {
  1397. return err
  1398. }
  1399. _, err = v.auth.Login(ctx, l)
  1400. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  1401. if err != nil {
  1402. return err
  1403. }
  1404. return nil
  1405. }
  1406. func (v *client) requestTokenWithJwtAuth(ctx context.Context, jwtAuth *esv1beta1.VaultJwtAuth) error {
  1407. role := strings.TrimSpace(jwtAuth.Role)
  1408. var jwt string
  1409. var err error
  1410. if jwtAuth.SecretRef != nil {
  1411. jwt, err = v.secretKeyRef(ctx, jwtAuth.SecretRef)
  1412. } else if k8sServiceAccountToken := jwtAuth.KubernetesServiceAccountToken; k8sServiceAccountToken != nil {
  1413. audiences := k8sServiceAccountToken.Audiences
  1414. if audiences == nil {
  1415. audiences = &[]string{"vault"}
  1416. }
  1417. expirationSeconds := k8sServiceAccountToken.ExpirationSeconds
  1418. if expirationSeconds == nil {
  1419. tmp := int64(600)
  1420. expirationSeconds = &tmp
  1421. }
  1422. jwt, err = v.serviceAccountToken(ctx, k8sServiceAccountToken.ServiceAccountRef, *audiences, *expirationSeconds)
  1423. } else {
  1424. err = fmt.Errorf(errJwtNoTokenSource)
  1425. }
  1426. if err != nil {
  1427. return err
  1428. }
  1429. parameters := map[string]interface{}{
  1430. "role": role,
  1431. "jwt": jwt,
  1432. }
  1433. url := strings.Join([]string{"auth", jwtAuth.Path, "login"}, "/")
  1434. vaultResult, err := v.logical.WriteWithContext(ctx, url, parameters)
  1435. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
  1436. if err != nil {
  1437. return err
  1438. }
  1439. token, err := vaultResult.TokenID()
  1440. if err != nil {
  1441. return fmt.Errorf(errVaultToken, err)
  1442. }
  1443. v.client.SetToken(token)
  1444. return nil
  1445. }
  1446. func (v *client) requestTokenWithCertAuth(ctx context.Context, certAuth *esv1beta1.VaultCertAuth, cfg *vault.Config) error {
  1447. clientKey, err := v.secretKeyRef(ctx, &certAuth.SecretRef)
  1448. if err != nil {
  1449. return err
  1450. }
  1451. clientCert, err := v.secretKeyRef(ctx, &certAuth.ClientCert)
  1452. if err != nil {
  1453. return err
  1454. }
  1455. cert, err := tls.X509KeyPair([]byte(clientCert), []byte(clientKey))
  1456. if err != nil {
  1457. return fmt.Errorf(errClientTLSAuth, err)
  1458. }
  1459. if transport, ok := cfg.HttpClient.Transport.(*http.Transport); ok {
  1460. transport.TLSClientConfig.Certificates = []tls.Certificate{cert}
  1461. }
  1462. url := strings.Join([]string{"auth", "cert", "login"}, "/")
  1463. vaultResult, err := v.logical.WriteWithContext(ctx, url, nil)
  1464. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultWriteSecretData, err)
  1465. if err != nil {
  1466. return fmt.Errorf(errVaultRequest, err)
  1467. }
  1468. token, err := vaultResult.TokenID()
  1469. if err != nil {
  1470. return fmt.Errorf(errVaultToken, err)
  1471. }
  1472. v.client.SetToken(token)
  1473. return nil
  1474. }
  1475. func (v *client) requestTokenWithIamAuth(ctx context.Context, iamAuth *esv1beta1.VaultIamAuth, ick bool, k kclient.Client, n string, jwtProvider util.JwtProviderFactory, assumeRoler vaultiamauth.STSProvider) error {
  1476. jwtAuth := iamAuth.JWTAuth
  1477. secretRefAuth := iamAuth.SecretRef
  1478. regionAWS := defaultAWSRegion
  1479. awsAuthMountPath := defaultAWSAuthMountPath
  1480. if iamAuth.Region != "" {
  1481. regionAWS = iamAuth.Region
  1482. }
  1483. if iamAuth.Path != "" {
  1484. awsAuthMountPath = iamAuth.Path
  1485. }
  1486. var creds *credentials.Credentials
  1487. var err error
  1488. if jwtAuth != nil { // use credentials from a sa explicitly defined and referenced. Highest preference is given to this method/configuration.
  1489. creds, err = vaultiamauth.CredsFromServiceAccount(ctx, *iamAuth, regionAWS, ick, k, n, jwtProvider)
  1490. if err != nil {
  1491. return err
  1492. }
  1493. } else if secretRefAuth != nil { // if jwtAuth is not defined, check if secretRef is defined. Second preference.
  1494. logger.V(1).Info("using credentials from secretRef")
  1495. creds, err = vaultiamauth.CredsFromSecretRef(ctx, *iamAuth, ick, k, n)
  1496. if err != nil {
  1497. return err
  1498. }
  1499. }
  1500. // Neither of jwtAuth or secretRefAuth defined. Last preference.
  1501. // Default to controller pod's identity
  1502. if jwtAuth == nil && secretRefAuth == nil {
  1503. // Checking if controller pod's service account is IRSA enabled and Web Identity token is available on pod
  1504. tknFile, tknFileEnvVarPresent := os.LookupEnv(vaultiamauth.AWSWebIdentityTokenFileEnvVar)
  1505. if !tknFileEnvVarPresent {
  1506. return fmt.Errorf(errIrsaTokenEnvVarNotFoundOnPod, vaultiamauth.AWSWebIdentityTokenFileEnvVar) // No Web Identity(IRSA) token found on pod
  1507. }
  1508. // IRSA enabled service account, let's check that the jwt token filemount and file exists
  1509. if _, err := os.Stat(tknFile); err != nil {
  1510. return fmt.Errorf(errIrsaTokenFileNotFoundOnPod, tknFile, err)
  1511. }
  1512. // everything looks good so far, let's fetch the jwt token from AWS_WEB_IDENTITY_TOKEN_FILE
  1513. jwtByte, err := os.ReadFile(tknFile)
  1514. if err != nil {
  1515. return fmt.Errorf(errIrsaTokenFileNotReadable, tknFile, err)
  1516. }
  1517. // let's parse the jwt token
  1518. parser := jwt.NewParser(jwt.WithoutClaimsValidation())
  1519. token, _, err := parser.ParseUnverified(string(jwtByte), jwt.MapClaims{})
  1520. if err != nil {
  1521. return fmt.Errorf(errIrsaTokenNotValidJWT, tknFile, err) // JWT token parser error
  1522. }
  1523. var ns string
  1524. var sa string
  1525. // let's fetch the namespace and serviceaccount from parsed jwt token
  1526. if claims, ok := token.Claims.(jwt.MapClaims); ok {
  1527. ns = claims["kubernetes.io"].(map[string]interface{})["namespace"].(string)
  1528. sa = claims["kubernetes.io"].(map[string]interface{})["serviceaccount"].(map[string]interface{})["name"].(string)
  1529. } else {
  1530. return fmt.Errorf(errPodInfoNotFoundOnToken, tknFile, err)
  1531. }
  1532. creds, err = vaultiamauth.CredsFromControllerServiceAccount(ctx, sa, ns, regionAWS, k, jwtProvider)
  1533. if err != nil {
  1534. return err
  1535. }
  1536. }
  1537. config := aws.NewConfig().WithEndpointResolver(vaultiamauth.ResolveEndpoint())
  1538. if creds != nil {
  1539. config.WithCredentials(creds)
  1540. }
  1541. if regionAWS != "" {
  1542. config.WithRegion(regionAWS)
  1543. }
  1544. sess, err := vaultiamauth.GetAWSSession(config)
  1545. if err != nil {
  1546. return err
  1547. }
  1548. if iamAuth.AWSIAMRole != "" {
  1549. stsclient := assumeRoler(sess)
  1550. if iamAuth.ExternalID != "" {
  1551. var setExternalID = func(p *stscreds.AssumeRoleProvider) {
  1552. p.ExternalID = aws.String(iamAuth.ExternalID)
  1553. }
  1554. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole, setExternalID))
  1555. } else {
  1556. sess.Config.WithCredentials(stscreds.NewCredentialsWithClient(stsclient, iamAuth.AWSIAMRole))
  1557. }
  1558. }
  1559. getCreds, err := sess.Config.Credentials.Get()
  1560. if err != nil {
  1561. return err
  1562. }
  1563. // Set environment variables. These would be fetched by Login
  1564. os.Setenv("AWS_ACCESS_KEY_ID", getCreds.AccessKeyID)
  1565. os.Setenv("AWS_SECRET_ACCESS_KEY", getCreds.SecretAccessKey)
  1566. os.Setenv("AWS_SESSION_TOKEN", getCreds.SessionToken)
  1567. var awsAuthClient *authaws.AWSAuth
  1568. if iamAuth.VaultAWSIAMServerID != "" {
  1569. awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath), authaws.WithIAMServerIDHeader(iamAuth.VaultAWSIAMServerID))
  1570. if err != nil {
  1571. return err
  1572. }
  1573. } else {
  1574. awsAuthClient, err = authaws.NewAWSAuth(authaws.WithRegion(regionAWS), authaws.WithIAMAuth(), authaws.WithRole(iamAuth.Role), authaws.WithMountPath(awsAuthMountPath))
  1575. if err != nil {
  1576. return err
  1577. }
  1578. }
  1579. _, err = v.auth.Login(ctx, awsAuthClient)
  1580. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLogin, err)
  1581. if err != nil {
  1582. return err
  1583. }
  1584. return nil
  1585. }
  1586. func init() {
  1587. var vaultTokenCacheSize int
  1588. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  1589. fs.BoolVar(&enableCache, "experimental-enable-vault-token-cache", false, "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.")
  1590. // max. 265k vault leases with 30bytes each ~= 7MB
  1591. fs.IntVar(&vaultTokenCacheSize, "experimental-vault-token-cache-size", 2<<17, "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.")
  1592. lateInit := func() {
  1593. logger.Info("initializing vault cache", "size", vaultTokenCacheSize)
  1594. clientCache = cache.Must(vaultTokenCacheSize, func(client util.Client) {
  1595. err := revokeTokenIfValid(context.Background(), client)
  1596. if err != nil {
  1597. logger.Error(err, "unable to revoke cached token on eviction")
  1598. }
  1599. })
  1600. }
  1601. feature.Register(feature.Feature{
  1602. Flags: fs,
  1603. Initialize: lateInit,
  1604. })
  1605. esv1beta1.Register(&Connector{
  1606. NewVaultClient: NewVaultClient,
  1607. }, &esv1beta1.SecretStoreProvider{
  1608. Vault: &esv1beta1.VaultProvider{},
  1609. })
  1610. }