client.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package kubernetes
  14. import (
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "strings"
  21. "github.com/tidwall/gjson"
  22. v1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/api/equality"
  24. apierrors "k8s.io/apimachinery/pkg/api/errors"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/labels"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. "github.com/external-secrets/external-secrets/pkg/constants"
  29. "github.com/external-secrets/external-secrets/pkg/esutils"
  30. "github.com/external-secrets/external-secrets/pkg/esutils/metadata"
  31. "github.com/external-secrets/external-secrets/pkg/find"
  32. "github.com/external-secrets/external-secrets/pkg/metrics"
  33. )
  34. const (
  35. metaLabels = "labels"
  36. metaAnnotations = "annotations"
  37. )
  38. // GetSecret retrieves a secret from the Kubernetes API server by its key.
  39. func (c *Client) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  40. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  41. if err != nil {
  42. return nil, err
  43. }
  44. // if property is not defined, we will return the json-serialized secret
  45. if ref.Property == "" {
  46. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  47. m := map[string]map[string]string{}
  48. m[metaLabels] = secret.Labels
  49. m[metaAnnotations] = secret.Annotations
  50. j, err := esutils.JSONMarshal(m)
  51. if err != nil {
  52. return nil, err
  53. }
  54. return j, nil
  55. }
  56. m := map[string]string{}
  57. for key, val := range secret.Data {
  58. m[key] = string(val)
  59. }
  60. j, err := esutils.JSONMarshal(m)
  61. if err != nil {
  62. return nil, err
  63. }
  64. return j, nil
  65. }
  66. return getSecret(secret, ref)
  67. }
  68. // DeleteSecret removes a secret value from Kubernetes.
  69. // It requires a property to be specified in the RemoteRef.
  70. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1.PushSecretRemoteRef) error {
  71. if remoteRef.GetProperty() == "" {
  72. return errors.New("requires property in RemoteRef to delete secret value")
  73. }
  74. extSecret, getErr := c.userSecretClient.Get(ctx, remoteRef.GetRemoteKey(), metav1.GetOptions{})
  75. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  76. if getErr != nil {
  77. if apierrors.IsNotFound(getErr) {
  78. // return gracefully if no secret exists
  79. return nil
  80. }
  81. return getErr
  82. }
  83. if _, ok := extSecret.Data[remoteRef.GetProperty()]; !ok {
  84. // return gracefully if specified secret does not contain the given property
  85. return nil
  86. }
  87. if len(extSecret.Data) > 1 {
  88. return c.removeProperty(ctx, extSecret, remoteRef)
  89. }
  90. return c.fullDelete(ctx, remoteRef.GetRemoteKey())
  91. }
  92. // SecretExists checks if a secret exists in Kubernetes.
  93. // This method is not implemented and always returns an error.
  94. func (c *Client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  95. return false, errors.New("not implemented")
  96. }
  97. // PushSecret creates or updates a secret in Kubernetes.
  98. func (c *Client) PushSecret(ctx context.Context, secret *v1.Secret, data esv1.PushSecretData) error {
  99. if data.GetProperty() == "" && data.GetSecretKey() != "" {
  100. return errors.New("requires property in RemoteRef to push secret value if secret key is defined")
  101. }
  102. remoteSecret := &v1.Secret{
  103. ObjectMeta: metav1.ObjectMeta{
  104. Namespace: c.store.RemoteNamespace,
  105. Name: data.GetRemoteKey(),
  106. },
  107. }
  108. return c.createOrUpdate(ctx, remoteSecret, func() error {
  109. return c.mergePushSecretData(data, remoteSecret, secret)
  110. })
  111. }
  112. func (c *Client) mergePushSecretData(remoteRef esv1.PushSecretData, remoteSecret, localSecret *v1.Secret) error {
  113. // apply secret type
  114. secretType := v1.SecretTypeOpaque
  115. if localSecret.Type != "" {
  116. secretType = localSecret.Type
  117. }
  118. remoteSecret.Type = secretType
  119. // merge secret data with existing secret data
  120. if remoteSecret.Data == nil {
  121. remoteSecret.Data = make(map[string][]byte)
  122. }
  123. pushMeta, err := metadata.ParseMetadataParameters[PushSecretMetadataSpec](remoteRef.GetMetadata())
  124. if err != nil {
  125. return fmt.Errorf("unable to parse metadata parameters: %w", err)
  126. }
  127. // merge metadata based on the policy
  128. var targetLabels, targetAnnotations map[string]string
  129. sourceLabels, sourceAnnotations, err := mergeSourceMetadata(localSecret, pushMeta)
  130. if err != nil {
  131. return fmt.Errorf("failed to merge source metadata: %w", err)
  132. }
  133. targetLabels, targetAnnotations, err = mergeTargetMetadata(remoteSecret, pushMeta, sourceLabels, sourceAnnotations)
  134. if err != nil {
  135. return fmt.Errorf("failed to merge target metadata: %w", err)
  136. }
  137. remoteSecret.ObjectMeta.Labels = targetLabels
  138. remoteSecret.ObjectMeta.Annotations = targetAnnotations
  139. if pushMeta != nil && pushMeta.Spec.RemoteNamespace != "" {
  140. remoteSecret.ObjectMeta.Namespace = pushMeta.Spec.RemoteNamespace
  141. }
  142. // case 1: push the whole secret
  143. if remoteRef.GetProperty() == "" {
  144. for k, v := range localSecret.Data {
  145. remoteSecret.Data[k] = v
  146. }
  147. return nil
  148. }
  149. // cases 2a + 2b: push into a property.
  150. // if secret key is empty, we will marshal the whole secret and put it into
  151. // the property defined in the remoteRef.
  152. if remoteRef.GetSecretKey() == "" {
  153. value, err := c.marshalData(localSecret)
  154. if err != nil {
  155. return err
  156. }
  157. remoteSecret.Data[remoteRef.GetProperty()] = value
  158. } else {
  159. // if secret key is defined, we will push that key from the local secret
  160. remoteSecret.Data[remoteRef.GetProperty()] = localSecret.Data[remoteRef.GetSecretKey()]
  161. }
  162. return nil
  163. }
  164. func (c *Client) createOrUpdate(ctx context.Context, targetSecret *v1.Secret, f func() error) error {
  165. target, err := c.userSecretClient.Get(ctx, targetSecret.Name, metav1.GetOptions{})
  166. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  167. if err != nil {
  168. if !apierrors.IsNotFound(err) {
  169. return err
  170. }
  171. if err := f(); err != nil {
  172. return err
  173. }
  174. _, err := c.userSecretClient.Create(ctx, targetSecret, metav1.CreateOptions{})
  175. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesCreateSecret, err)
  176. if err != nil {
  177. return err
  178. }
  179. return nil
  180. }
  181. *targetSecret = *target
  182. existing := targetSecret.DeepCopyObject()
  183. if err := f(); err != nil {
  184. return err
  185. }
  186. if equality.Semantic.DeepEqual(existing, targetSecret) {
  187. return nil
  188. }
  189. _, err = c.userSecretClient.Update(ctx, targetSecret, metav1.UpdateOptions{})
  190. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  191. if err != nil {
  192. return err
  193. }
  194. return nil
  195. }
  196. func (c *Client) marshalData(secret *v1.Secret) ([]byte, error) {
  197. values := make(map[string]string)
  198. for k, v := range secret.Data {
  199. values[k] = string(v)
  200. }
  201. // marshal
  202. value, err := esutils.JSONMarshal(values)
  203. if err != nil {
  204. return nil, fmt.Errorf("failed to marshal secrets into a single property: %w", err)
  205. }
  206. return value, nil
  207. }
  208. // GetSecretMap retrieves a secret from Kubernetes and returns it as a map.
  209. // The secret data is converted to a map of key/value pairs.
  210. func (c *Client) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  211. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  212. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  213. if apierrors.IsNotFound(err) {
  214. return nil, esv1.NoSecretError{}
  215. }
  216. if err != nil {
  217. return nil, err
  218. }
  219. var tmpMap map[string][]byte
  220. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  221. tmpMap, err = getSecretMetadata(secret)
  222. if err != nil {
  223. return nil, err
  224. }
  225. } else {
  226. tmpMap = secret.Data
  227. }
  228. if ref.Property != "" {
  229. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  230. if err != nil {
  231. return nil, err
  232. }
  233. return retMap, nil
  234. }
  235. return tmpMap, nil
  236. }
  237. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  238. byteArr, err := esutils.JSONMarshal(tmpMap)
  239. if err != nil {
  240. return nil, err
  241. }
  242. var retMap map[string][]byte
  243. jsonStr := string(byteArr)
  244. // We need to search if a given key with a . exists before using gjson operations.
  245. idx := strings.Index(property, ".")
  246. if idx > -1 {
  247. refProperty := strings.ReplaceAll(property, ".", "\\.")
  248. retMap, err = getMapFromValues(refProperty, jsonStr)
  249. if err != nil {
  250. return nil, err
  251. }
  252. if retMap != nil {
  253. return retMap, nil
  254. }
  255. }
  256. retMap, err = getMapFromValues(property, jsonStr)
  257. if err != nil {
  258. return nil, err
  259. }
  260. if retMap == nil {
  261. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  262. }
  263. return retMap, nil
  264. }
  265. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  266. val := gjson.Get(jsonStr, property)
  267. if val.Exists() {
  268. retMap := make(map[string][]byte)
  269. var tmpMap map[string]any
  270. decoded, err := base64.StdEncoding.DecodeString(val.String())
  271. if err != nil {
  272. return nil, err
  273. }
  274. err = json.Unmarshal(decoded, &tmpMap)
  275. if err != nil {
  276. return nil, err
  277. }
  278. for k, v := range tmpMap {
  279. b, err := esutils.JSONMarshal(v)
  280. if err != nil {
  281. return nil, err
  282. }
  283. retMap[k] = b
  284. }
  285. return retMap, nil
  286. }
  287. return nil, nil
  288. }
  289. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  290. var err error
  291. tmpMap := make(map[string][]byte)
  292. tmpMap[metaLabels], err = esutils.JSONMarshal(secret.ObjectMeta.Labels)
  293. if err != nil {
  294. return nil, err
  295. }
  296. tmpMap[metaAnnotations], err = esutils.JSONMarshal(secret.ObjectMeta.Annotations)
  297. if err != nil {
  298. return nil, err
  299. }
  300. return tmpMap, nil
  301. }
  302. // GetAllSecrets retrieves multiple secrets from Kubernetes based on the search criteria.
  303. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  304. if ref.Tags != nil {
  305. return c.findByTags(ctx, ref)
  306. }
  307. if ref.Name != nil {
  308. return c.findByName(ctx, ref)
  309. }
  310. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  311. }
  312. func (c *Client) findByTags(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  313. // empty/nil tags = everything
  314. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  315. if err != nil {
  316. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  317. }
  318. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  319. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  320. if err != nil {
  321. return nil, fmt.Errorf("unable to list secrets: %w", err)
  322. }
  323. data := make(map[string][]byte)
  324. for _, secret := range secrets.Items {
  325. jsonStr, err := esutils.JSONMarshal(convertMap(secret.Data))
  326. if err != nil {
  327. return nil, err
  328. }
  329. data[secret.Name] = jsonStr
  330. }
  331. return esutils.ConvertKeys(ref.ConversionStrategy, data)
  332. }
  333. func (c *Client) findByName(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  334. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  335. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  336. if err != nil {
  337. return nil, fmt.Errorf("unable to list secrets: %w", err)
  338. }
  339. matcher, err := find.New(*ref.Name)
  340. if err != nil {
  341. return nil, err
  342. }
  343. data := make(map[string][]byte)
  344. for _, secret := range secrets.Items {
  345. if !matcher.MatchName(secret.Name) {
  346. continue
  347. }
  348. jsonStr, err := esutils.JSONMarshal(convertMap(secret.Data))
  349. if err != nil {
  350. return nil, err
  351. }
  352. data[secret.Name] = jsonStr
  353. }
  354. return esutils.ConvertKeys(ref.ConversionStrategy, data)
  355. }
  356. // Close implements cleanup operations for the Kubernetes client.
  357. func (c *Client) Close(_ context.Context) error {
  358. return nil
  359. }
  360. func convertMap(in map[string][]byte) map[string]string {
  361. out := make(map[string]string)
  362. for k, v := range in {
  363. out[k] = string(v)
  364. }
  365. return out
  366. }
  367. // fullDelete removes remote secret completely.
  368. func (c *Client) fullDelete(ctx context.Context, secretName string) error {
  369. err := c.userSecretClient.Delete(ctx, secretName, metav1.DeleteOptions{})
  370. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesDeleteSecret, err)
  371. // gracefully return on not found
  372. if apierrors.IsNotFound(err) {
  373. return nil
  374. }
  375. return err
  376. }
  377. // removeProperty removes single data property from remote secret.
  378. func (c *Client) removeProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1.PushSecretRemoteRef) error {
  379. delete(extSecret.Data, remoteRef.GetProperty())
  380. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  381. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  382. return err
  383. }
  384. func getSecret(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  385. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  386. s, found, err := getFromSecretMetadata(secret, ref)
  387. if err != nil {
  388. return nil, err
  389. }
  390. if !found {
  391. return nil, fmt.Errorf("property %s does not exist in metadata of secret %q", ref.Property, ref.Key)
  392. }
  393. return s, nil
  394. }
  395. s, found := getFromSecretData(secret, ref)
  396. if !found {
  397. return nil, fmt.Errorf("property %s does not exist in data of secret %q", ref.Property, ref.Key)
  398. }
  399. return s, nil
  400. }
  401. func getFromSecretData(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, bool) {
  402. // Check if a property with "." exists first such as file.png
  403. v, ok := secret.Data[ref.Property]
  404. if ok {
  405. return v, true
  406. }
  407. idx := strings.Index(ref.Property, ".")
  408. if idx == -1 || idx == 0 || idx == len(ref.Property)-1 {
  409. return nil, false
  410. }
  411. v, ok = secret.Data[ref.Property[:idx]]
  412. if !ok {
  413. return nil, false
  414. }
  415. val := gjson.Get(string(v), ref.Property[idx+1:])
  416. if !val.Exists() {
  417. return nil, false
  418. }
  419. return []byte(val.String()), true
  420. }
  421. func getFromSecretMetadata(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, bool, error) {
  422. path := strings.Split(ref.Property, ".")
  423. var metadata map[string]string
  424. switch path[0] {
  425. case metaLabels:
  426. metadata = secret.Labels
  427. case metaAnnotations:
  428. metadata = secret.Annotations
  429. default:
  430. return nil, false, nil
  431. }
  432. if len(path) == 1 {
  433. j, err := esutils.JSONMarshal(metadata)
  434. if err != nil {
  435. return nil, false, err
  436. }
  437. return j, true, nil
  438. }
  439. v, ok := metadata[path[1]]
  440. if !ok {
  441. return nil, false, nil
  442. }
  443. if len(path) == 2 {
  444. return []byte(v), true, nil
  445. }
  446. val := gjson.Get(v, strings.Join(path[2:], ""))
  447. if !val.Exists() {
  448. return nil, false, nil
  449. }
  450. return []byte(val.String()), true, nil
  451. }