webhook.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package webhook
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/tls"
  17. "crypto/x509"
  18. "fmt"
  19. "io"
  20. "net/http"
  21. "net/url"
  22. "strings"
  23. tpl "text/template"
  24. "github.com/Masterminds/sprig"
  25. "github.com/PaesslerAG/jsonpath"
  26. "gopkg.in/yaml.v3"
  27. corev1 "k8s.io/api/core/v1"
  28. "sigs.k8s.io/controller-runtime/pkg/client"
  29. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  30. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  31. "github.com/external-secrets/external-secrets/pkg/provider"
  32. "github.com/external-secrets/external-secrets/pkg/provider/schema"
  33. "github.com/external-secrets/external-secrets/pkg/template"
  34. )
  35. // Provider satisfies the provider interface.
  36. type Provider struct{}
  37. type WebHook struct {
  38. kube client.Client
  39. store esv1beta1.GenericStore
  40. namespace string
  41. storeKind string
  42. http *http.Client
  43. }
  44. func init() {
  45. schema.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  46. Webhook: &esv1beta1.WebhookProvider{},
  47. })
  48. }
  49. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (provider.SecretsClient, error) {
  50. whClient := &WebHook{
  51. kube: kube,
  52. store: store,
  53. namespace: namespace,
  54. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  55. }
  56. provider, err := getProvider(store)
  57. if err != nil {
  58. return nil, err
  59. }
  60. whClient.http, err = whClient.getHTTPClient(provider)
  61. if err != nil {
  62. return nil, err
  63. }
  64. return whClient, nil
  65. }
  66. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.WebhookProvider, error) {
  67. spc := store.GetSpec()
  68. if spc == nil || spc.Provider == nil || spc.Provider.Webhook == nil {
  69. return nil, fmt.Errorf("missing store provider webhook")
  70. }
  71. return spc.Provider.Webhook, nil
  72. }
  73. func (w *WebHook) getStoreSecret(ctx context.Context, ref esmeta.SecretKeySelector) (*corev1.Secret, error) {
  74. ke := client.ObjectKey{
  75. Name: ref.Name,
  76. Namespace: w.namespace,
  77. }
  78. if w.storeKind == esv1beta1.ClusterSecretStoreKind {
  79. if ref.Namespace == nil {
  80. return nil, fmt.Errorf("no namespace on ClusterSecretStore webhook secret %s", ref.Name)
  81. }
  82. ke.Namespace = *ref.Namespace
  83. }
  84. secret := &corev1.Secret{}
  85. if err := w.kube.Get(ctx, ke, secret); err != nil {
  86. return nil, fmt.Errorf("failed to get clustersecretstore webhook secret %s: %w", ref.Name, err)
  87. }
  88. return secret, nil
  89. }
  90. // Empty GetAllSecrets.
  91. func (w *WebHook) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  92. // TO be implemented
  93. return nil, fmt.Errorf("GetAllSecrets not implemented")
  94. }
  95. func (w *WebHook) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  96. provider, err := getProvider(w.store)
  97. if err != nil {
  98. return nil, fmt.Errorf("failed to get store: %w", err)
  99. }
  100. result, err := w.getWebhookData(ctx, provider, ref)
  101. if err != nil {
  102. return nil, err
  103. }
  104. // Only parse as json if we have a jsonpath set
  105. if provider.Result.JSONPath != "" {
  106. jsondata := interface{}(nil)
  107. if err := yaml.Unmarshal(result, &jsondata); err != nil {
  108. return nil, fmt.Errorf("failed to parse response json: %w", err)
  109. }
  110. jsondata, err = jsonpath.Get(provider.Result.JSONPath, jsondata)
  111. if err != nil {
  112. return nil, fmt.Errorf("failed to get response path %s: %w", provider.Result.JSONPath, err)
  113. }
  114. jsonvalue, ok := jsondata.(string)
  115. if !ok {
  116. return nil, fmt.Errorf("failed to get response (wrong type: %T)", jsondata)
  117. }
  118. return []byte(jsonvalue), nil
  119. }
  120. return result, nil
  121. }
  122. func (w *WebHook) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  123. provider, err := getProvider(w.store)
  124. if err != nil {
  125. return nil, fmt.Errorf("failed to get store: %w", err)
  126. }
  127. result, err := w.getWebhookData(ctx, provider, ref)
  128. if err != nil {
  129. return nil, err
  130. }
  131. // We always want json here, so just parse it out
  132. jsondata := interface{}(nil)
  133. if err := yaml.Unmarshal(result, &jsondata); err != nil {
  134. return nil, fmt.Errorf("failed to parse response json: %w", err)
  135. }
  136. // Get subdata via jsonpath, if given
  137. if provider.Result.JSONPath != "" {
  138. jsondata, err = jsonpath.Get(provider.Result.JSONPath, jsondata)
  139. if err != nil {
  140. return nil, fmt.Errorf("failed to get response path %s: %w", provider.Result.JSONPath, err)
  141. }
  142. }
  143. // If the value is a string, try to parse it as json
  144. jsonstring, ok := jsondata.(string)
  145. if ok {
  146. // This could also happen if the response was a single json-encoded string
  147. // but that is an extremely unlikely scenario
  148. if err := yaml.Unmarshal([]byte(jsonstring), &jsondata); err != nil {
  149. return nil, fmt.Errorf("failed to parse response json from jsonpath: %w", err)
  150. }
  151. }
  152. // Use the data as a key-value map
  153. jsonvalue, ok := jsondata.(map[string]interface{})
  154. if !ok {
  155. return nil, fmt.Errorf("failed to get response (wrong type: %T)", jsondata)
  156. }
  157. // Change the map of generic objects to a map of byte arrays
  158. values := make(map[string][]byte)
  159. for rKey, rValue := range jsonvalue {
  160. jVal, ok := rValue.(string)
  161. if !ok {
  162. return nil, fmt.Errorf("failed to get response (wrong type in key '%s': %T)", rKey, rValue)
  163. }
  164. values[rKey] = []byte(jVal)
  165. }
  166. return values, nil
  167. }
  168. func (w *WebHook) getTemplateData(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef, secrets []esv1beta1.WebhookSecret) (map[string]map[string]string, error) {
  169. data := map[string]map[string]string{
  170. "remoteRef": {
  171. "key": url.QueryEscape(ref.Key),
  172. "version": url.QueryEscape(ref.Version),
  173. "property": url.QueryEscape(ref.Property),
  174. },
  175. }
  176. for _, secref := range secrets {
  177. if _, ok := data[secref.Name]; !ok {
  178. data[secref.Name] = make(map[string]string)
  179. }
  180. secret, err := w.getStoreSecret(ctx, secref.SecretRef)
  181. if err != nil {
  182. return nil, err
  183. }
  184. for sKey, sVal := range secret.Data {
  185. data[secref.Name][sKey] = string(sVal)
  186. }
  187. }
  188. return data, nil
  189. }
  190. func (w *WebHook) getWebhookData(ctx context.Context, provider *esv1beta1.WebhookProvider, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  191. if w.http == nil {
  192. return nil, fmt.Errorf("http client not initialized")
  193. }
  194. data, err := w.getTemplateData(ctx, ref, provider.Secrets)
  195. if err != nil {
  196. return nil, err
  197. }
  198. method := provider.Method
  199. if method == "" {
  200. method = http.MethodGet
  201. }
  202. url, err := executeTemplateString(provider.URL, data)
  203. if err != nil {
  204. return nil, fmt.Errorf("failed to parse url: %w", err)
  205. }
  206. body, err := executeTemplate(provider.Body, data)
  207. if err != nil {
  208. return nil, fmt.Errorf("failed to parse body: %w", err)
  209. }
  210. req, err := http.NewRequestWithContext(ctx, method, url, &body)
  211. if err != nil {
  212. return nil, fmt.Errorf("failed to create request: %w", err)
  213. }
  214. for hKey, hValueTpl := range provider.Headers {
  215. hValue, err := executeTemplateString(hValueTpl, data)
  216. if err != nil {
  217. return nil, fmt.Errorf("failed to parse header %s: %w", hKey, err)
  218. }
  219. req.Header.Add(hKey, hValue)
  220. }
  221. resp, err := w.http.Do(req)
  222. if err != nil {
  223. return nil, fmt.Errorf("failed to call endpoint: %w", err)
  224. }
  225. defer resp.Body.Close()
  226. if resp.StatusCode < 200 || resp.StatusCode >= 300 {
  227. return nil, fmt.Errorf("endpoint gave error %s", resp.Status)
  228. }
  229. return io.ReadAll(resp.Body)
  230. }
  231. func (w *WebHook) getHTTPClient(provider *esv1beta1.WebhookProvider) (*http.Client, error) {
  232. client := &http.Client{}
  233. if provider.Timeout != nil {
  234. client.Timeout = provider.Timeout.Duration
  235. }
  236. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  237. // No need to process ca stuff if it is not there
  238. return client, nil
  239. }
  240. caCertPool, err := w.getCACertPool(provider)
  241. if err != nil {
  242. return nil, err
  243. }
  244. tlsConf := &tls.Config{
  245. RootCAs: caCertPool,
  246. MinVersion: tls.VersionTLS12,
  247. }
  248. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  249. return client, nil
  250. }
  251. func (w *WebHook) getCACertPool(provider *esv1beta1.WebhookProvider) (*x509.CertPool, error) {
  252. caCertPool := x509.NewCertPool()
  253. if len(provider.CABundle) > 0 {
  254. ok := caCertPool.AppendCertsFromPEM(provider.CABundle)
  255. if !ok {
  256. return nil, fmt.Errorf("failed to append cabundle")
  257. }
  258. }
  259. if provider.CAProvider != nil && w.storeKind == esv1beta1.ClusterSecretStoreKind && provider.CAProvider.Namespace == nil {
  260. return nil, fmt.Errorf("missing namespace on CAProvider secret")
  261. }
  262. if provider.CAProvider != nil {
  263. var cert []byte
  264. var err error
  265. switch provider.CAProvider.Type {
  266. case esv1beta1.WebhookCAProviderTypeSecret:
  267. cert, err = w.getCertFromSecret(provider)
  268. case esv1beta1.WebhookCAProviderTypeConfigMap:
  269. cert, err = w.getCertFromConfigMap(provider)
  270. default:
  271. err = fmt.Errorf("unknown caprovider type: %s", provider.CAProvider.Type)
  272. }
  273. if err != nil {
  274. return nil, err
  275. }
  276. ok := caCertPool.AppendCertsFromPEM(cert)
  277. if !ok {
  278. return nil, fmt.Errorf("failed to append cabundle")
  279. }
  280. }
  281. return caCertPool, nil
  282. }
  283. func (w *WebHook) getCertFromSecret(provider *esv1beta1.WebhookProvider) ([]byte, error) {
  284. secretRef := esmeta.SecretKeySelector{
  285. Name: provider.CAProvider.Name,
  286. Key: provider.CAProvider.Key,
  287. }
  288. if provider.CAProvider.Namespace != nil {
  289. secretRef.Namespace = provider.CAProvider.Namespace
  290. }
  291. ctx := context.Background()
  292. res, err := w.secretKeyRef(ctx, &secretRef)
  293. if err != nil {
  294. return nil, err
  295. }
  296. return []byte(res), nil
  297. }
  298. func (w *WebHook) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  299. secret := &corev1.Secret{}
  300. ref := client.ObjectKey{
  301. Namespace: w.namespace,
  302. Name: secretRef.Name,
  303. }
  304. if (w.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  305. (secretRef.Namespace != nil) {
  306. ref.Namespace = *secretRef.Namespace
  307. }
  308. err := w.kube.Get(ctx, ref, secret)
  309. if err != nil {
  310. return "", err
  311. }
  312. keyBytes, ok := secret.Data[secretRef.Key]
  313. if !ok {
  314. return "", err
  315. }
  316. value := string(keyBytes)
  317. valueStr := strings.TrimSpace(value)
  318. return valueStr, nil
  319. }
  320. func (w *WebHook) getCertFromConfigMap(provider *esv1beta1.WebhookProvider) ([]byte, error) {
  321. objKey := client.ObjectKey{
  322. Name: provider.CAProvider.Name,
  323. }
  324. if provider.CAProvider.Namespace != nil {
  325. objKey.Namespace = *provider.CAProvider.Namespace
  326. }
  327. configMapRef := &corev1.ConfigMap{}
  328. ctx := context.Background()
  329. err := w.kube.Get(ctx, objKey, configMapRef)
  330. if err != nil {
  331. return nil, fmt.Errorf("failed to get caprovider secret %s: %w", objKey.Name, err)
  332. }
  333. val, ok := configMapRef.Data[provider.CAProvider.Key]
  334. if !ok {
  335. return nil, fmt.Errorf("failed to get caprovider configmap %s -> %s", objKey.Name, provider.CAProvider.Key)
  336. }
  337. return []byte(val), nil
  338. }
  339. func (w *WebHook) Close(ctx context.Context) error {
  340. return nil
  341. }
  342. func (w *WebHook) Validate() error {
  343. return nil
  344. }
  345. func executeTemplateString(tmpl string, data map[string]map[string]string) (string, error) {
  346. result, err := executeTemplate(tmpl, data)
  347. if err != nil {
  348. return "", err
  349. }
  350. return result.String(), nil
  351. }
  352. func executeTemplate(tmpl string, data map[string]map[string]string) (bytes.Buffer, error) {
  353. var result bytes.Buffer
  354. if tmpl == "" {
  355. return result, nil
  356. }
  357. urlt, err := tpl.New("webhooktemplate").Funcs(sprig.TxtFuncMap()).Funcs(template.FuncMap()).Parse(tmpl)
  358. if err != nil {
  359. return result, err
  360. }
  361. if err := urlt.Execute(&result, data); err != nil {
  362. return result, err
  363. }
  364. return result, nil
  365. }