provider.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package vault
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "time"
  19. vault "github.com/hashicorp/vault/api"
  20. "github.com/spf13/pflag"
  21. "k8s.io/client-go/kubernetes"
  22. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  23. ctrl "sigs.k8s.io/controller-runtime"
  24. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  25. ctrlcfg "sigs.k8s.io/controller-runtime/pkg/client/config"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. vaultutil "github.com/external-secrets/external-secrets/providers/v1/vault/util"
  28. "github.com/external-secrets/external-secrets/runtime/cache"
  29. "github.com/external-secrets/external-secrets/runtime/esutils/resolvers"
  30. "github.com/external-secrets/external-secrets/runtime/feature"
  31. )
  32. var (
  33. _ esv1.Provider = &Provider{}
  34. enableCache bool
  35. logger = ctrl.Log.WithName("provider").WithName("vault")
  36. clientCache *cache.Cache[vaultutil.Client]
  37. )
  38. const (
  39. errVaultStore = "received invalid Vault SecretStore resource: %w"
  40. errVaultClient = "cannot setup new vault client: %w"
  41. errVaultCert = "cannot set Vault CA certificate: %w"
  42. errClientTLSAuth = "error from Client TLS Auth: %q"
  43. errCANamespace = "missing namespace on caProvider secret"
  44. )
  45. const (
  46. defaultCacheSize = 2 << 17
  47. )
  48. // Provider implements the ESO Provider interface for Hashicorp Vault.
  49. type Provider struct {
  50. // NewVaultClient is a function that returns a new Vault client.
  51. // This is used for testing to inject a fake client.
  52. NewVaultClient func(config *vault.Config) (vaultutil.Client, error)
  53. }
  54. // NewVaultClient returns a new Vault client.
  55. func NewVaultClient(config *vault.Config) (vaultutil.Client, error) {
  56. vaultClient, err := vault.NewClient(config)
  57. if err != nil {
  58. return nil, err
  59. }
  60. return &vaultutil.VaultClient{
  61. SetTokenFunc: vaultClient.SetToken,
  62. TokenFunc: vaultClient.Token,
  63. ClearTokenFunc: vaultClient.ClearToken,
  64. AuthField: vaultClient.Auth(),
  65. AuthTokenField: vaultClient.Auth().Token(),
  66. LogicalField: vaultClient.Logical(),
  67. NamespaceFunc: vaultClient.Namespace,
  68. SetNamespaceFunc: vaultClient.SetNamespace,
  69. AddHeaderFunc: vaultClient.AddHeader,
  70. }, nil
  71. }
  72. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  73. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  74. return esv1.SecretStoreReadWrite
  75. }
  76. // NewClient implements the Client interface.
  77. func (p *Provider) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  78. // controller-runtime/client does not support TokenRequest or other subresource APIs
  79. // so we need to construct our own client and use it to fetch tokens
  80. // (for Kubernetes service account token auth)
  81. restCfg, err := ctrlcfg.GetConfig()
  82. if err != nil {
  83. return nil, err
  84. }
  85. clientset, err := kubernetes.NewForConfig(restCfg)
  86. if err != nil {
  87. return nil, err
  88. }
  89. return p.newClient(ctx, store, kube, clientset.CoreV1(), namespace)
  90. }
  91. // NewGeneratorClient creates a new Vault client for the generator controller.
  92. func (p *Provider) NewGeneratorClient(
  93. ctx context.Context,
  94. kube kclient.Client,
  95. corev1 typedcorev1.CoreV1Interface,
  96. vaultSpec *esv1.VaultProvider,
  97. namespace string,
  98. retrySettings *esv1.SecretStoreRetrySettings,
  99. ) (vaultutil.Client, error) {
  100. vStore, cfg, err := p.prepareConfig(ctx, kube, corev1, vaultSpec, retrySettings, namespace, resolvers.EmptyStoreKind)
  101. if err != nil {
  102. return nil, err
  103. }
  104. client, err := p.NewVaultClient(cfg)
  105. if err != nil {
  106. return nil, err
  107. }
  108. _, err = p.initClient(ctx, vStore, client, cfg, vaultSpec)
  109. if err != nil {
  110. return nil, err
  111. }
  112. return client, nil
  113. }
  114. func (p *Provider) newClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, corev1 typedcorev1.CoreV1Interface, namespace string) (esv1.SecretsClient, error) {
  115. storeSpec := store.GetSpec()
  116. if storeSpec == nil || storeSpec.Provider == nil || storeSpec.Provider.Vault == nil {
  117. return nil, errors.New(errVaultStore)
  118. }
  119. vaultSpec := storeSpec.Provider.Vault
  120. vStore, cfg, err := p.prepareConfig(
  121. ctx,
  122. kube,
  123. corev1,
  124. vaultSpec,
  125. storeSpec.RetrySettings,
  126. namespace,
  127. store.GetObjectKind().GroupVersionKind().Kind)
  128. if err != nil {
  129. return nil, err
  130. }
  131. client, err := getVaultClient(p, store, cfg, namespace)
  132. if err != nil {
  133. return nil, fmt.Errorf(errVaultClient, err)
  134. }
  135. return p.initClient(ctx, vStore, client, cfg, vaultSpec)
  136. }
  137. func (p *Provider) initClient(ctx context.Context, c *client, client vaultutil.Client, cfg *vault.Config, vaultSpec *esv1.VaultProvider) (esv1.SecretsClient, error) {
  138. if vaultSpec.Namespace != nil {
  139. client.SetNamespace(*vaultSpec.Namespace)
  140. }
  141. if vaultSpec.Headers != nil {
  142. for hKey, hValue := range vaultSpec.Headers {
  143. client.AddHeader(hKey, hValue)
  144. }
  145. }
  146. if vaultSpec.ReadYourWrites && vaultSpec.ForwardInconsistent {
  147. client.AddHeader("X-Vault-Inconsistent", "forward-active-node")
  148. }
  149. c.client = client
  150. c.auth = client.Auth()
  151. c.logical = client.Logical()
  152. c.token = client.AuthToken()
  153. // allow SecretStore controller validation to pass
  154. // when using referent namespace.
  155. if c.storeKind == esv1.ClusterSecretStoreKind && c.namespace == "" && isReferentSpec(vaultSpec) {
  156. return c, nil
  157. }
  158. if err := c.setAuth(ctx, cfg); err != nil {
  159. return nil, err
  160. }
  161. return c, nil
  162. }
  163. func (p *Provider) prepareConfig(
  164. ctx context.Context,
  165. kube kclient.Client,
  166. corev1 typedcorev1.CoreV1Interface,
  167. vaultSpec *esv1.VaultProvider,
  168. retrySettings *esv1.SecretStoreRetrySettings,
  169. namespace, storeKind string,
  170. ) (*client, *vault.Config, error) {
  171. c := &client{
  172. kube: kube,
  173. corev1: corev1,
  174. store: vaultSpec,
  175. log: logger,
  176. namespace: namespace,
  177. storeKind: storeKind,
  178. }
  179. cfg, err := c.newConfig(ctx)
  180. if err != nil {
  181. return nil, nil, err
  182. }
  183. // Setup retry options if present
  184. if retrySettings != nil {
  185. if retrySettings.MaxRetries != nil {
  186. cfg.MaxRetries = int(*retrySettings.MaxRetries)
  187. } else {
  188. // By default we rely only on the reconciliation process for retrying
  189. cfg.MaxRetries = 0
  190. }
  191. if retrySettings.RetryInterval != nil {
  192. retryWait, err := time.ParseDuration(*retrySettings.RetryInterval)
  193. if err != nil {
  194. return nil, nil, err
  195. }
  196. cfg.MinRetryWait = retryWait
  197. cfg.MaxRetryWait = retryWait
  198. }
  199. }
  200. return c, cfg, nil
  201. }
  202. func getVaultClient(p *Provider, store esv1.GenericStore, cfg *vault.Config, namespace string) (vaultutil.Client, error) {
  203. vaultProvider := store.GetSpec().Provider.Vault
  204. auth := vaultProvider.Auth
  205. isStaticToken := auth != nil && auth.TokenSecretRef != nil
  206. useCache := enableCache && !isStaticToken
  207. keyNamespace := store.GetObjectMeta().Namespace
  208. // A single ClusterSecretStore may need to spawn separate vault clients for each namespace.
  209. if store.GetTypeMeta().Kind == esv1.ClusterSecretStoreKind && namespace != "" && isReferentSpec(vaultProvider) {
  210. keyNamespace = namespace
  211. }
  212. key := cache.Key{
  213. Name: store.GetObjectMeta().Name,
  214. Namespace: keyNamespace,
  215. Kind: store.GetTypeMeta().Kind,
  216. }
  217. if useCache {
  218. client, ok := clientCache.Get(store.GetObjectMeta().ResourceVersion, key)
  219. if ok {
  220. return client, nil
  221. }
  222. }
  223. client, err := p.NewVaultClient(cfg)
  224. if err != nil {
  225. return nil, fmt.Errorf(errVaultClient, err)
  226. }
  227. if useCache && !clientCache.Contains(key) {
  228. clientCache.Add(store.GetObjectMeta().ResourceVersion, key, client)
  229. }
  230. return client, nil
  231. }
  232. func isReferentSpec(prov *esv1.VaultProvider) bool {
  233. if prov.Auth == nil {
  234. return false
  235. }
  236. if prov.Auth.TokenSecretRef != nil && prov.Auth.TokenSecretRef.Namespace == nil {
  237. return true
  238. }
  239. if prov.Auth.AppRole != nil && prov.Auth.AppRole.SecretRef.Namespace == nil {
  240. return true
  241. }
  242. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.SecretRef != nil && prov.Auth.Kubernetes.SecretRef.Namespace == nil {
  243. return true
  244. }
  245. if prov.Auth.Kubernetes != nil && prov.Auth.Kubernetes.ServiceAccountRef != nil && prov.Auth.Kubernetes.ServiceAccountRef.Namespace == nil {
  246. return true
  247. }
  248. if prov.Auth.Ldap != nil && prov.Auth.Ldap.SecretRef.Namespace == nil {
  249. return true
  250. }
  251. if prov.Auth.UserPass != nil && prov.Auth.UserPass.SecretRef.Namespace == nil {
  252. return true
  253. }
  254. if prov.Auth.Jwt != nil && prov.Auth.Jwt.SecretRef != nil && prov.Auth.Jwt.SecretRef.Namespace == nil {
  255. return true
  256. }
  257. if prov.Auth.Jwt != nil && prov.Auth.Jwt.KubernetesServiceAccountToken != nil && prov.Auth.Jwt.KubernetesServiceAccountToken.ServiceAccountRef.Namespace == nil {
  258. return true
  259. }
  260. if prov.Auth.Cert != nil && prov.Auth.Cert.SecretRef.Namespace == nil {
  261. return true
  262. }
  263. if prov.Auth.Iam != nil && prov.Auth.Iam.JWTAuth != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef != nil && prov.Auth.Iam.JWTAuth.ServiceAccountRef.Namespace == nil {
  264. return true
  265. }
  266. if prov.Auth.Iam != nil && prov.Auth.Iam.SecretRef != nil &&
  267. (prov.Auth.Iam.SecretRef.AccessKeyID.Namespace == nil ||
  268. prov.Auth.Iam.SecretRef.SecretAccessKey.Namespace == nil ||
  269. (prov.Auth.Iam.SecretRef.SessionToken != nil && prov.Auth.Iam.SecretRef.SessionToken.Namespace == nil)) {
  270. return true
  271. }
  272. return false
  273. }
  274. func initCache(size int) {
  275. logger.Info("initializing vault cache", "size", size)
  276. clientCache = cache.Must(size, func(client vaultutil.Client) {
  277. err := revokeTokenIfValid(context.Background(), client)
  278. if err != nil {
  279. logger.Error(err, "unable to revoke cached token on eviction")
  280. }
  281. })
  282. }
  283. func init() {
  284. var vaultTokenCacheSize int
  285. fs := pflag.NewFlagSet("vault", pflag.ExitOnError)
  286. fs.BoolVar(
  287. &enableCache,
  288. "experimental-enable-vault-token-cache",
  289. false,
  290. "Enable experimental Vault token cache. External secrets will reuse the Vault token without creating a new one on each request.",
  291. )
  292. // max. 265k vault leases with 30bytes each ~= 7MB
  293. fs.IntVar(
  294. &vaultTokenCacheSize,
  295. "experimental-vault-token-cache-size",
  296. defaultCacheSize,
  297. "Maximum size of Vault token cache. When more tokens than Only used if --experimental-enable-vault-token-cache is set.",
  298. )
  299. feature.Register(feature.Feature{
  300. Flags: fs,
  301. Initialize: func() { initCache(vaultTokenCacheSize) },
  302. })
  303. }
  304. // NewProvider creates a new Provider instance.
  305. func NewProvider() esv1.Provider {
  306. return &Provider{
  307. NewVaultClient: NewVaultClient,
  308. }
  309. }
  310. // ProviderSpec returns the provider specification for registration.
  311. func ProviderSpec() *esv1.SecretStoreProvider {
  312. return &esv1.SecretStoreProvider{
  313. Vault: &esv1.VaultProvider{},
  314. }
  315. }
  316. // MaintenanceStatus returns the maintenance status of the provider.
  317. func MaintenanceStatus() esv1.MaintenanceStatus {
  318. return esv1.MaintenanceStatusMaintained
  319. }