auth.go 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package vault
  14. import (
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "time"
  20. vault "github.com/hashicorp/vault/api"
  21. authv1 "k8s.io/api/authentication/v1"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. typedcorev1 "k8s.io/client-go/kubernetes/typed/core/v1"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  26. vaultiamauth "github.com/external-secrets/external-secrets/providers/v1/vault/iamauth"
  27. vaultutil "github.com/external-secrets/external-secrets/providers/v1/vault/util"
  28. "github.com/external-secrets/external-secrets/runtime/constants"
  29. "github.com/external-secrets/external-secrets/runtime/metrics"
  30. )
  31. const (
  32. errAuthFormat = "cannot initialize Vault client: no valid auth method specified"
  33. errVaultToken = "cannot parse Vault authentication token: %w"
  34. errGetKubeSATokenRequest = "cannot request Kubernetes service account token for service account %q: %w"
  35. errVaultRevokeToken = "error while revoking token: %w"
  36. )
  37. // setAuth gets a new token using the configured mechanism.
  38. // If there's already a valid token, does nothing.
  39. func (c *client) setAuth(ctx context.Context, cfg *vault.Config) error {
  40. if c.store.Auth == nil {
  41. return nil
  42. }
  43. if c.store.Namespace != nil { // set namespace before checking the need for AuthNamespace
  44. c.client.SetNamespace(*c.store.Namespace)
  45. }
  46. // Switch to auth namespace if different from the provider namespace
  47. restoreNamespace := c.useAuthNamespace(ctx)
  48. defer restoreNamespace()
  49. tokenExists := false
  50. var (
  51. err error
  52. expiry *time.Time
  53. )
  54. if c.client.Token() != "" {
  55. tokenExists, expiry, err = checkToken(ctx, c.token)
  56. }
  57. // update the token before returning so it's always the latest value even if the token does not exist.
  58. c.tokenExpiryTime = expiry
  59. if tokenExists {
  60. // if token expiry exists only re-use it IF the token expiry didn't expire
  61. if expiry == nil || expiry.After(time.Now()) {
  62. c.log.V(1).Info("Re-using existing token")
  63. return err
  64. }
  65. }
  66. tokenExists, err = setSecretKeyToken(ctx, c)
  67. if tokenExists {
  68. c.log.V(1).Info("Set token from secret")
  69. return err
  70. }
  71. tokenExists, err = setAppRoleToken(ctx, c)
  72. if tokenExists {
  73. c.log.V(1).Info("Retrieved new token using AppRole auth")
  74. return err
  75. }
  76. tokenExists, err = setKubernetesAuthToken(ctx, c)
  77. if tokenExists {
  78. c.log.V(1).Info("Retrieved new token using Kubernetes auth")
  79. return err
  80. }
  81. tokenExists, err = setLdapAuthToken(ctx, c)
  82. if tokenExists {
  83. c.log.V(1).Info("Retrieved new token using LDAP auth")
  84. return err
  85. }
  86. tokenExists, err = setUserPassAuthToken(ctx, c)
  87. if tokenExists {
  88. c.log.V(1).Info("Retrieved new token using userPass auth")
  89. return err
  90. }
  91. tokenExists, err = setJwtAuthToken(ctx, c)
  92. if tokenExists {
  93. c.log.V(1).Info("Retrieved new token using JWT auth")
  94. return err
  95. }
  96. tokenExists, err = setCertAuthToken(ctx, c, cfg)
  97. if tokenExists {
  98. c.log.V(1).Info("Retrieved new token using certificate auth")
  99. return err
  100. }
  101. tokenExists, err = setIamAuthToken(ctx, c, vaultiamauth.DefaultJWTProvider, vaultiamauth.DefaultSTSProvider)
  102. if tokenExists {
  103. c.log.V(1).Info("Retrieved new token using IAM auth")
  104. return err
  105. }
  106. tokenExists, err = setGcpAuthToken(ctx, c)
  107. if tokenExists {
  108. c.log.V(1).Info("Retrieved new token using GCP auth")
  109. return err
  110. }
  111. return errors.New(errAuthFormat)
  112. }
  113. func createServiceAccountToken(
  114. ctx context.Context,
  115. corev1Client typedcorev1.CoreV1Interface,
  116. storeKind string,
  117. namespace string,
  118. serviceAccountRef esmeta.ServiceAccountSelector,
  119. additionalAud []string,
  120. expirationSeconds int64) (string, error) {
  121. audiences := serviceAccountRef.Audiences
  122. if len(additionalAud) > 0 {
  123. audiences = append(audiences, additionalAud...)
  124. }
  125. tokenRequest := &authv1.TokenRequest{
  126. ObjectMeta: metav1.ObjectMeta{
  127. Namespace: namespace,
  128. },
  129. Spec: authv1.TokenRequestSpec{
  130. Audiences: audiences,
  131. ExpirationSeconds: &expirationSeconds,
  132. },
  133. }
  134. if (storeKind == esv1.ClusterSecretStoreKind) &&
  135. (serviceAccountRef.Namespace != nil) {
  136. tokenRequest.Namespace = *serviceAccountRef.Namespace
  137. }
  138. tokenResponse, err := corev1Client.ServiceAccounts(tokenRequest.Namespace).
  139. CreateToken(ctx, serviceAccountRef.Name, tokenRequest, metav1.CreateOptions{})
  140. if err != nil {
  141. return "", fmt.Errorf(errGetKubeSATokenRequest, serviceAccountRef.Name, err)
  142. }
  143. return tokenResponse.Status.Token, nil
  144. }
  145. // checkToken does a lookup and checks if the provided token exists.
  146. func checkToken(ctx context.Context, token vaultutil.Token) (bool, *time.Time, error) {
  147. // https://www.vaultproject.io/api-docs/auth/token#lookup-a-token-self
  148. resp, err := token.LookupSelfWithContext(ctx)
  149. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultLookupSelf, err)
  150. if err != nil {
  151. return false, nil, err
  152. }
  153. // LookupSelfWithContext() calls ParseSecret(), which has several places
  154. // that return no data and no error, including when a token is expired.
  155. if resp == nil {
  156. return false, nil, errors.New("no response nor error for token lookup")
  157. }
  158. t, ok := resp.Data["type"]
  159. if !ok {
  160. return false, nil, errors.New("could not assert token type")
  161. }
  162. tokenType := t.(string)
  163. if tokenType == "batch" {
  164. return false, nil, nil
  165. }
  166. ttl, ok := resp.Data["ttl"]
  167. if !ok {
  168. return false, nil, errors.New("no TTL found in response")
  169. }
  170. ttlInt, err := ttl.(json.Number).Int64()
  171. if err != nil {
  172. return false, nil, fmt.Errorf("invalid token TTL: %v: %w", ttl, err)
  173. }
  174. expireTime, ok := resp.Data["expire_time"]
  175. if !ok {
  176. return false, nil, errors.New("no expiration time found in response")
  177. }
  178. if ttlInt < 60 && expireTime != nil {
  179. // Treat expirable tokens that are about to expire as already expired.
  180. // This ensures that the token won't expire in between this check and
  181. // performing the actual operation.
  182. return false, nil, nil
  183. }
  184. if expireTime == nil {
  185. return true, nil, nil
  186. }
  187. et, ok := expireTime.(string)
  188. if !ok {
  189. return false, nil, fmt.Errorf("expire time is not a string but is: %T", expireTime)
  190. }
  191. parsedExpiry, err := time.Parse(time.RFC3339, et)
  192. if err != nil {
  193. return false, nil, fmt.Errorf("invalid token expiration time: %v: %w", et, err)
  194. }
  195. return true, &parsedExpiry, nil
  196. }
  197. func revokeTokenIfValid(ctx context.Context, client vaultutil.Client) error {
  198. valid, _, err := checkToken(ctx, client.AuthToken())
  199. if err != nil {
  200. return fmt.Errorf(errVaultRevokeToken, err)
  201. }
  202. if valid {
  203. err = client.AuthToken().RevokeSelfWithContext(ctx, client.Token())
  204. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultRevokeSelf, err)
  205. if err != nil {
  206. return fmt.Errorf(errVaultRevokeToken, err)
  207. }
  208. client.ClearToken()
  209. }
  210. return nil
  211. }
  212. func (c *client) useAuthNamespace(_ context.Context) func() {
  213. ns := ""
  214. if c.store != nil && c.store.Namespace != nil {
  215. ns = *c.store.Namespace
  216. }
  217. if c.store.Auth != nil && c.store.Auth.Namespace != nil {
  218. // Different Auth Vault Namespace than Secret Vault Namespace
  219. // Switch namespaces then switch back at the end
  220. if c.store.Auth.Namespace != nil && *c.store.Auth.Namespace != ns {
  221. c.log.V(1).Info("Using namespace=%s for the vault login", *c.store.Auth.Namespace)
  222. c.client.SetNamespace(*c.store.Auth.Namespace)
  223. // use this as a defer to reset the namespace
  224. return func() {
  225. c.log.V(1).Info("Restoring client namespace to namespace=%s", ns)
  226. c.client.SetNamespace(ns)
  227. }
  228. }
  229. }
  230. return func() {
  231. // no-op
  232. }
  233. }