mirror of
https://github.com/SAP/jenkins-library.git
synced 2024-12-12 10:55:20 +02:00
0ba4c2206c
* update all deprecated ioutil usages * forgotten changes * add missing imports * undo changing comment * add missing 'os' import * fix integration test --------- Co-authored-by: I557621 <jordi.van.liempt@sap.com> Co-authored-by: Gulom Alimov <gulomjon.alimov@sap.com>
496 lines
16 KiB
Go
496 lines
16 KiB
Go
package config
|
|
|
|
import (
|
|
"os"
|
|
"path"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/SAP/jenkins-library/pkg/config/interpolation"
|
|
"github.com/SAP/jenkins-library/pkg/log"
|
|
"github.com/SAP/jenkins-library/pkg/piperutils"
|
|
"github.com/SAP/jenkins-library/pkg/vault"
|
|
"github.com/hashicorp/vault/api"
|
|
)
|
|
|
|
const (
|
|
vaultRootPaths = "vaultRootPaths"
|
|
vaultTestCredentialPath = "vaultTestCredentialPath"
|
|
vaultCredentialPath = "vaultCredentialPath"
|
|
vaultTestCredentialKeys = "vaultTestCredentialKeys"
|
|
vaultCredentialKeys = "vaultCredentialKeys"
|
|
vaultAppRoleID = "vaultAppRoleID"
|
|
vaultAppRoleSecretID = "vaultAppRoleSecreId"
|
|
vaultServerUrl = "vaultServerUrl"
|
|
vaultNamespace = "vaultNamespace"
|
|
vaultBasePath = "vaultBasePath"
|
|
vaultPipelineName = "vaultPipelineName"
|
|
vaultPath = "vaultPath"
|
|
skipVault = "skipVault"
|
|
vaultDisableOverwrite = "vaultDisableOverwrite"
|
|
vaultTestCredentialEnvPrefix = "vaultTestCredentialEnvPrefix"
|
|
vaultCredentialEnvPrefix = "vaultCredentialEnvPrefix"
|
|
vaultTestCredentialEnvPrefixDefault = "PIPER_TESTCREDENTIAL_"
|
|
VaultCredentialEnvPrefixDefault = "PIPER_VAULTCREDENTIAL_"
|
|
vaultSecretName = ".+VaultSecretName$"
|
|
)
|
|
|
|
var (
|
|
vaultFilter = []string{
|
|
vaultRootPaths,
|
|
vaultAppRoleID,
|
|
vaultAppRoleSecretID,
|
|
vaultServerUrl,
|
|
vaultNamespace,
|
|
vaultBasePath,
|
|
vaultPipelineName,
|
|
vaultPath,
|
|
skipVault,
|
|
vaultDisableOverwrite,
|
|
vaultTestCredentialPath,
|
|
vaultTestCredentialKeys,
|
|
vaultTestCredentialEnvPrefix,
|
|
vaultCredentialPath,
|
|
vaultCredentialKeys,
|
|
vaultCredentialEnvPrefix,
|
|
vaultSecretName,
|
|
}
|
|
|
|
// VaultRootPaths are the lookup paths piper tries to use during the vault lookup.
|
|
// A path is only used if it's variables can be interpolated from the config
|
|
VaultRootPaths = []string{
|
|
"$(vaultPath)",
|
|
"$(vaultBasePath)/$(vaultPipelineName)",
|
|
"$(vaultBasePath)/GROUP-SECRETS",
|
|
}
|
|
|
|
// VaultSecretFileDirectory holds the directory for the current step run to temporarily store secret files fetched from vault
|
|
VaultSecretFileDirectory = ""
|
|
)
|
|
|
|
// VaultCredentials hold all the auth information needed to fetch configuration from vault
|
|
type VaultCredentials struct {
|
|
AppRoleID string
|
|
AppRoleSecretID string
|
|
VaultToken string
|
|
}
|
|
|
|
// vaultClient interface for mocking
|
|
type vaultClient interface {
|
|
GetKvSecret(string) (map[string]string, error)
|
|
MustRevokeToken()
|
|
}
|
|
|
|
func (s *StepConfig) mixinVaultConfig(parameters []StepParameters, configs ...map[string]interface{}) {
|
|
for _, config := range configs {
|
|
s.mixIn(config, vaultFilter)
|
|
// when an empty filter is returned we skip the mixin call since an empty filter will allow everything
|
|
if referencesFilter := getFilterForResourceReferences(parameters); len(referencesFilter) > 0 {
|
|
s.mixIn(config, referencesFilter)
|
|
}
|
|
}
|
|
}
|
|
|
|
func getVaultClientFromConfig(config StepConfig, creds VaultCredentials) (vaultClient, error) {
|
|
address, addressOk := config.Config["vaultServerUrl"].(string)
|
|
// if vault isn't used it's not an error
|
|
|
|
if !addressOk || creds.VaultToken == "" && (creds.AppRoleID == "" || creds.AppRoleSecretID == "") {
|
|
log.Entry().Debug("Skipping fetching secrets from Vault since it is not configured")
|
|
return nil, nil
|
|
}
|
|
namespace := ""
|
|
// namespaces are only available in vault enterprise so using them should be optional
|
|
if config.Config["vaultNamespace"] != nil {
|
|
namespace = config.Config["vaultNamespace"].(string)
|
|
log.Entry().Debugf("Using Vault namespace %s", namespace)
|
|
}
|
|
|
|
var client vaultClient
|
|
var err error
|
|
clientConfig := &vault.Config{Config: &api.Config{Address: address}, Namespace: namespace}
|
|
if creds.VaultToken != "" {
|
|
log.Entry().Debugf("Using Vault Token Authentication")
|
|
client, err = vault.NewClient(clientConfig, creds.VaultToken)
|
|
} else {
|
|
log.Entry().Debugf("Using Vault AppRole Authentication")
|
|
client, err = vault.NewClientWithAppRole(clientConfig, creds.AppRoleID, creds.AppRoleSecretID)
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
log.Entry().Infof("Fetching secrets from Vault at %s", address)
|
|
return client, nil
|
|
}
|
|
|
|
func resolveAllVaultReferences(config *StepConfig, client vaultClient, params []StepParameters) {
|
|
for _, param := range params {
|
|
if ref := param.GetReference("vaultSecret"); ref != nil {
|
|
resolveVaultReference(ref, config, client, param)
|
|
}
|
|
if ref := param.GetReference("vaultSecretFile"); ref != nil {
|
|
resolveVaultReference(ref, config, client, param)
|
|
}
|
|
}
|
|
}
|
|
|
|
func resolveVaultReference(ref *ResourceReference, config *StepConfig, client vaultClient, param StepParameters) {
|
|
vaultDisableOverwrite, _ := config.Config["vaultDisableOverwrite"].(bool)
|
|
if _, ok := config.Config[param.Name].(string); vaultDisableOverwrite && ok {
|
|
log.Entry().Debugf("Not fetching '%s' from Vault since it has already been set", param.Name)
|
|
return
|
|
}
|
|
|
|
var secretValue *string
|
|
for _, vaultPath := range getSecretReferencePaths(ref, config.Config) {
|
|
// it should be possible to configure the root path were the secret is stored
|
|
vaultPath, ok := interpolation.ResolveString(vaultPath, config.Config)
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
secretValue = lookupPath(client, vaultPath, ¶m)
|
|
if secretValue != nil {
|
|
log.Entry().Infof("Resolved param '%s' with Vault path '%s'", param.Name, vaultPath)
|
|
if ref.Type == "vaultSecret" {
|
|
config.Config[param.Name] = *secretValue
|
|
} else if ref.Type == "vaultSecretFile" {
|
|
filePath, err := createTemporarySecretFile(param.Name, *secretValue)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Warnf("Couldn't create temporary secret file for '%s'", param.Name)
|
|
return
|
|
}
|
|
config.Config[param.Name] = filePath
|
|
}
|
|
break
|
|
}
|
|
}
|
|
if secretValue == nil {
|
|
log.Entry().Warnf("Could not resolve param '%s' from Vault", param.Name)
|
|
}
|
|
}
|
|
|
|
func resolveVaultTestCredentialsWrapper(config *StepConfig, client vaultClient) {
|
|
log.Entry().Debugln("resolveVaultTestCredentialsWrapper")
|
|
resolveVaultTestCredentialsWrapperBase(config, client, vaultTestCredentialPath, vaultTestCredentialKeys, resolveVaultTestCredentials)
|
|
}
|
|
|
|
func resolveVaultCredentialsWrapper(config *StepConfig, client vaultClient) {
|
|
log.Entry().Debugln("resolveVaultCredentialsWrapper")
|
|
resolveVaultTestCredentialsWrapperBase(config, client, vaultCredentialPath, vaultCredentialKeys, resolveVaultCredentials)
|
|
}
|
|
|
|
func resolveVaultTestCredentialsWrapperBase(
|
|
config *StepConfig, client vaultClient,
|
|
vaultCredPath, vaultCredKeys string,
|
|
resolveVaultCredentials func(config *StepConfig, client vaultClient),
|
|
) {
|
|
switch config.Config[vaultCredPath].(type) {
|
|
case string:
|
|
resolveVaultCredentials(config, client)
|
|
case []interface{}:
|
|
vaultCredentialPathCopy := config.Config[vaultCredPath]
|
|
vaultCredentialKeysCopy := config.Config[vaultCredKeys]
|
|
|
|
if _, ok := vaultCredentialKeysCopy.([]interface{}); !ok {
|
|
log.Entry().Debugf("Not fetching credentials from vault since they are not (properly) configured: unknown type of keys")
|
|
return
|
|
}
|
|
|
|
if len(vaultCredentialKeysCopy.([]interface{})) != len(vaultCredentialPathCopy.([]interface{})) {
|
|
log.Entry().Debugf("Not fetching credentials from vault since they are not (properly) configured: not same count of values and keys")
|
|
return
|
|
}
|
|
|
|
for i := 0; i < len(vaultCredentialPathCopy.([]interface{})); i++ {
|
|
config.Config[vaultCredPath] = vaultCredentialPathCopy.([]interface{})[i]
|
|
config.Config[vaultCredKeys] = vaultCredentialKeysCopy.([]interface{})[i]
|
|
resolveVaultCredentials(config, client)
|
|
}
|
|
|
|
config.Config[vaultCredPath] = vaultCredentialPathCopy
|
|
config.Config[vaultCredKeys] = vaultCredentialKeysCopy
|
|
default:
|
|
log.Entry().Debugf("Not fetching credentials from vault since they are not (properly) configured: unknown type of path")
|
|
return
|
|
}
|
|
}
|
|
|
|
// resolve test credential keys and expose as environment variables
|
|
func resolveVaultTestCredentials(config *StepConfig, client vaultClient) {
|
|
credPath, pathOk := config.Config[vaultTestCredentialPath].(string)
|
|
keys := getTestCredentialKeys(config)
|
|
if !(pathOk && keys != nil) || credPath == "" || len(keys) == 0 {
|
|
log.Entry().Debugf("Not fetching test credentials from Vault since they are not (properly) configured")
|
|
return
|
|
}
|
|
|
|
lookupPath := make([]string, 3)
|
|
lookupPath[0] = "$(vaultPath)/" + credPath
|
|
lookupPath[1] = "$(vaultBasePath)/$(vaultPipelineName)/" + credPath
|
|
lookupPath[2] = "$(vaultBasePath)/GROUP-SECRETS/" + credPath
|
|
|
|
for _, path := range lookupPath {
|
|
vaultPath, ok := interpolation.ResolveString(path, config.Config)
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
secret, err := client.GetKvSecret(vaultPath)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Debugf("Couldn't fetch secret at '%s'", vaultPath)
|
|
continue
|
|
}
|
|
if secret == nil {
|
|
continue
|
|
}
|
|
secretsResolved := false
|
|
secretsResolved = populateTestCredentialsAsEnvs(config, secret, keys)
|
|
if secretsResolved {
|
|
// prevent overwriting resolved secrets
|
|
// only allows vault test credentials on one / the same vault path
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
func resolveVaultCredentials(config *StepConfig, client vaultClient) {
|
|
credPath, pathOk := config.Config[vaultCredentialPath].(string)
|
|
keys := getCredentialKeys(config)
|
|
if !(pathOk && keys != nil) || credPath == "" || len(keys) == 0 {
|
|
log.Entry().Debugf("Not fetching credentials from vault since they are not (properly) configured")
|
|
return
|
|
}
|
|
|
|
lookupPath := make([]string, 3)
|
|
lookupPath[0] = "$(vaultPath)/" + credPath
|
|
lookupPath[1] = "$(vaultBasePath)/$(vaultPipelineName)/" + credPath
|
|
lookupPath[2] = "$(vaultBasePath)/GROUP-SECRETS/" + credPath
|
|
|
|
for _, path := range lookupPath {
|
|
vaultPath, ok := interpolation.ResolveString(path, config.Config)
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
secret, err := client.GetKvSecret(vaultPath)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Debugf("Couldn't fetch secret at '%s'", vaultPath)
|
|
continue
|
|
}
|
|
if secret == nil {
|
|
continue
|
|
}
|
|
secretsResolved := false
|
|
secretsResolved = populateCredentialsAsEnvs(config, secret, keys)
|
|
if secretsResolved {
|
|
// prevent overwriting resolved secrets
|
|
// only allows vault test credentials on one / the same vault path
|
|
break
|
|
}
|
|
}
|
|
}
|
|
|
|
func populateTestCredentialsAsEnvs(config *StepConfig, secret map[string]string, keys []string) (matched bool) {
|
|
|
|
vaultTestCredentialEnvPrefix, ok := config.Config["vaultTestCredentialEnvPrefix"].(string)
|
|
if !ok || len(vaultTestCredentialEnvPrefix) == 0 {
|
|
vaultTestCredentialEnvPrefix = vaultTestCredentialEnvPrefixDefault
|
|
}
|
|
for secretKey, secretValue := range secret {
|
|
for _, key := range keys {
|
|
if secretKey == key {
|
|
log.RegisterSecret(secretValue)
|
|
envVariable := vaultTestCredentialEnvPrefix + ConvertEnvVar(secretKey)
|
|
log.Entry().Debugf("Exposing test credential '%v' as '%v'", key, envVariable)
|
|
os.Setenv(envVariable, secretValue)
|
|
matched = true
|
|
}
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func populateCredentialsAsEnvs(config *StepConfig, secret map[string]string, keys []string) (matched bool) {
|
|
|
|
vaultCredentialEnvPrefix, ok := config.Config["vaultCredentialEnvPrefix"].(string)
|
|
isCredentialEnvPrefixDefault := false
|
|
|
|
if !ok {
|
|
vaultCredentialEnvPrefix = VaultCredentialEnvPrefixDefault
|
|
isCredentialEnvPrefixDefault = true
|
|
}
|
|
for secretKey, secretValue := range secret {
|
|
for _, key := range keys {
|
|
if secretKey == key {
|
|
log.RegisterSecret(secretValue)
|
|
envVariable := vaultCredentialEnvPrefix + ConvertEnvVar(secretKey)
|
|
log.Entry().Debugf("Exposing general purpose credential '%v' as '%v'", key, envVariable)
|
|
os.Setenv(envVariable, secretValue)
|
|
|
|
log.RegisterSecret(piperutils.EncodeString(secretValue))
|
|
envVariable = vaultCredentialEnvPrefix + ConvertEnvVar(secretKey) + "_BASE64"
|
|
log.Entry().Debugf("Exposing general purpose base64 encoded credential '%v' as '%v'", key, envVariable)
|
|
os.Setenv(envVariable, piperutils.EncodeString(secretValue))
|
|
matched = true
|
|
}
|
|
}
|
|
}
|
|
|
|
// we always create a standard env variable with the default prefx so that
|
|
// we can always refer to it in steps if its to be hard-coded
|
|
if !isCredentialEnvPrefixDefault {
|
|
for secretKey, secretValue := range secret {
|
|
for _, key := range keys {
|
|
if secretKey == key {
|
|
log.RegisterSecret(secretValue)
|
|
envVariable := VaultCredentialEnvPrefixDefault + ConvertEnvVar(secretKey)
|
|
log.Entry().Debugf("Exposing general purpose credential '%v' as '%v'", key, envVariable)
|
|
os.Setenv(envVariable, secretValue)
|
|
|
|
log.RegisterSecret(piperutils.EncodeString(secretValue))
|
|
envVariable = VaultCredentialEnvPrefixDefault + ConvertEnvVar(secretKey) + "_BASE64"
|
|
log.Entry().Debugf("Exposing general purpose base64 encoded credential '%v' as '%v'", key, envVariable)
|
|
os.Setenv(envVariable, piperutils.EncodeString(secretValue))
|
|
matched = true
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func getTestCredentialKeys(config *StepConfig) []string {
|
|
keysRaw, ok := config.Config[vaultTestCredentialKeys].([]interface{})
|
|
if !ok {
|
|
return nil
|
|
}
|
|
keys := make([]string, 0, len(keysRaw))
|
|
for _, keyRaw := range keysRaw {
|
|
key, ok := keyRaw.(string)
|
|
if !ok {
|
|
log.Entry().Warnf("%s needs to be an array of strings", vaultTestCredentialKeys)
|
|
return nil
|
|
}
|
|
keys = append(keys, key)
|
|
}
|
|
return keys
|
|
}
|
|
|
|
func getCredentialKeys(config *StepConfig) []string {
|
|
keysRaw, ok := config.Config[vaultCredentialKeys].([]interface{})
|
|
if !ok {
|
|
log.Entry().Debugf("Not fetching general purpose credentials from vault since they are not (properly) configured")
|
|
return nil
|
|
}
|
|
keys := make([]string, 0, len(keysRaw))
|
|
for _, keyRaw := range keysRaw {
|
|
key, ok := keyRaw.(string)
|
|
if !ok {
|
|
log.Entry().Warnf("%s is needs to be an array of strings", vaultCredentialKeys)
|
|
return nil
|
|
}
|
|
keys = append(keys, key)
|
|
}
|
|
return keys
|
|
}
|
|
|
|
// ConvertEnvVar converts to a valid environment variable string
|
|
func ConvertEnvVar(s string) string {
|
|
r := strings.ToUpper(s)
|
|
r = strings.ReplaceAll(r, "-", "_")
|
|
reg, err := regexp.Compile("[^a-zA-Z0-9_]*")
|
|
if err != nil {
|
|
log.Entry().Debugf("could not compile regex of convertEnvVar: %v", err)
|
|
}
|
|
replacedString := reg.ReplaceAllString(r, "")
|
|
return replacedString
|
|
}
|
|
|
|
// RemoveVaultSecretFiles removes all secret files that have been created during execution
|
|
func RemoveVaultSecretFiles() {
|
|
if VaultSecretFileDirectory != "" {
|
|
os.RemoveAll(VaultSecretFileDirectory)
|
|
}
|
|
}
|
|
|
|
func createTemporarySecretFile(namePattern string, content string) (string, error) {
|
|
if VaultSecretFileDirectory == "" {
|
|
var err error
|
|
fileUtils := &piperutils.Files{}
|
|
VaultSecretFileDirectory, err = fileUtils.TempDir("", "vault")
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
}
|
|
|
|
file, err := os.CreateTemp(VaultSecretFileDirectory, namePattern)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
defer file.Close()
|
|
_, err = file.WriteString(content)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return file.Name(), nil
|
|
}
|
|
|
|
func lookupPath(client vaultClient, path string, param *StepParameters) *string {
|
|
log.Entry().Debugf("Trying to resolve Vault parameter '%s' at '%s'", param.Name, path)
|
|
secret, err := client.GetKvSecret(path)
|
|
if err != nil {
|
|
log.Entry().WithError(err).Warnf("Couldn't fetch secret at '%s'", path)
|
|
return nil
|
|
}
|
|
if secret == nil {
|
|
return nil
|
|
}
|
|
|
|
field := secret[param.Name]
|
|
if field != "" {
|
|
log.RegisterSecret(field)
|
|
return &field
|
|
}
|
|
log.Entry().Debugf("Secret did not contain a field name '%s'", param.Name)
|
|
// try parameter aliases
|
|
for _, alias := range param.Aliases {
|
|
log.Entry().Debugf("Trying alias field name '%s'", alias.Name)
|
|
field := secret[alias.Name]
|
|
if field != "" {
|
|
log.RegisterSecret(field)
|
|
if alias.Deprecated {
|
|
log.Entry().WithField("package", "SAP/jenkins-library/pkg/config").Warningf("DEPRECATION NOTICE: old step config key '%s' used in Vault. Please switch to '%s'!", alias.Name, param.Name)
|
|
}
|
|
return &field
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getSecretReferencePaths(reference *ResourceReference, config map[string]interface{}) []string {
|
|
retPaths := make([]string, 0, len(VaultRootPaths))
|
|
secretName := reference.Default
|
|
if providedName, ok := config[reference.Name].(string); ok && providedName != "" {
|
|
secretName = providedName
|
|
}
|
|
for _, rootPath := range VaultRootPaths {
|
|
fullPath := path.Join(rootPath, secretName)
|
|
retPaths = append(retPaths, fullPath)
|
|
}
|
|
return retPaths
|
|
}
|
|
|
|
func toStringSlice(interfaceSlice []interface{}) []string {
|
|
retSlice := make([]string, 0, len(interfaceSlice))
|
|
for _, vRaw := range interfaceSlice {
|
|
if v, ok := vRaw.(string); ok {
|
|
retSlice = append(retSlice, v)
|
|
continue
|
|
}
|
|
log.Entry().Warnf("'%s' needs to be of type string or an array of strings but got %T (%[2]v)", vaultPath, vRaw)
|
|
}
|
|
return retSlice
|
|
}
|