pulumi.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package pulumi
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. "dario.cat/mergo"
  19. esc "github.com/pulumi/esc-sdk/sdk/go"
  20. corev1 "k8s.io/api/core/v1"
  21. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  22. "github.com/external-secrets/external-secrets/pkg/utils"
  23. )
  24. type client struct {
  25. escClient esc.EscClient
  26. authCtx context.Context
  27. project string
  28. environment string
  29. organization string
  30. }
  31. const (
  32. errPushSecretsNotSupported = "pushing secrets is currently not supported by Pulumi"
  33. errDeleteSecretsNotSupported = "deleting secrets is currently not supported by Pulumi"
  34. errUnableToGetValues = "unable to get value for key %s: %w"
  35. errGettingAllSecretsNotSupported = "getting all secrets is currently not supported by Pulumi"
  36. errReadEnvironment = "error reading environment : %w"
  37. errPushSecrets = "error pushing secret: %w"
  38. errInterfaceType = "interface{} is not of type map[string]interface{}"
  39. errPushWholeSecret = "pushing the whole secret is not yet implemented"
  40. )
  41. var _ esv1.SecretsClient = &client{}
  42. func (c *client) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  43. env, err := c.escClient.OpenEnvironment(c.authCtx, c.organization, c.project, c.environment)
  44. if err != nil {
  45. return nil, err
  46. }
  47. value, _, err := c.escClient.ReadEnvironmentProperty(c.authCtx, c.organization, c.project, c.environment, env.GetId(), ref.Key)
  48. if err != nil {
  49. return nil, err
  50. }
  51. return utils.GetByteValue(value.GetValue())
  52. }
  53. func createSubmaps(input map[string]interface{}) map[string]interface{} {
  54. result := make(map[string]interface{})
  55. for key, value := range input {
  56. keys := strings.Split(key, ".")
  57. current := result
  58. for i, k := range keys {
  59. if i == len(keys)-1 {
  60. current[k] = value
  61. } else {
  62. if _, exists := current[k]; !exists {
  63. current[k] = make(map[string]interface{})
  64. }
  65. current = current[k].(map[string]interface{})
  66. }
  67. }
  68. }
  69. return result
  70. }
  71. func (c *client) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  72. secretKey := data.GetSecretKey()
  73. if secretKey == "" {
  74. return errors.New(errPushWholeSecret)
  75. }
  76. value := secret.Data[secretKey]
  77. updatePayload := &esc.EnvironmentDefinition{
  78. Values: &esc.EnvironmentDefinitionValues{
  79. AdditionalProperties: map[string]interface{}{
  80. data.GetRemoteKey(): string(value),
  81. },
  82. },
  83. }
  84. _, oldValues, err := c.escClient.OpenAndReadEnvironment(c.authCtx, c.organization, c.project, c.environment)
  85. if err != nil {
  86. return fmt.Errorf(errReadEnvironment, err)
  87. }
  88. updatePayload.Values.AdditionalProperties = createSubmaps(updatePayload.Values.AdditionalProperties)
  89. if err := mergo.Merge(&updatePayload.Values.AdditionalProperties, oldValues); err != nil {
  90. return fmt.Errorf(errPushSecrets, err)
  91. }
  92. _, err = c.escClient.UpdateEnvironment(c.authCtx, c.organization, c.project, c.environment, updatePayload)
  93. if err != nil {
  94. return fmt.Errorf(errPushSecrets, err)
  95. }
  96. return nil
  97. }
  98. func (c *client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  99. return false, errors.New(errPushSecretsNotSupported)
  100. }
  101. func (c *client) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  102. return errors.New(errDeleteSecretsNotSupported)
  103. }
  104. func (c *client) Validate() (esv1.ValidationResult, error) {
  105. return esv1.ValidationResultReady, nil
  106. }
  107. func GetMapFromInterface(i interface{}) (map[string][]byte, error) {
  108. // Assert the interface{} to map[string]interface{}
  109. m, ok := i.(map[string]interface{})
  110. if !ok {
  111. return nil, errors.New(errInterfaceType)
  112. }
  113. // Create a new map to hold the result
  114. result := make(map[string][]byte)
  115. // Iterate over the map and convert each value to []byte
  116. for key, value := range m {
  117. result[key], _ = utils.GetByteValue(value)
  118. }
  119. return result, nil
  120. }
  121. func (c *client) GetSecretMap(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  122. env, err := c.escClient.OpenEnvironment(c.authCtx, c.organization, c.project, c.environment)
  123. if err != nil {
  124. return nil, err
  125. }
  126. value, _, err := c.escClient.ReadEnvironmentProperty(c.authCtx, c.organization, c.project, c.environment, env.GetId(), ref.Key)
  127. if err != nil {
  128. return nil, err
  129. }
  130. kv, _ := GetMapFromInterface(value.GetValue())
  131. secretData := make(map[string][]byte)
  132. for k, v := range kv {
  133. byteValue, err := utils.GetByteValue(v)
  134. if err != nil {
  135. return nil, err
  136. }
  137. val := esc.Value{}
  138. err = val.UnmarshalJSON(byteValue)
  139. if err != nil {
  140. return nil, err
  141. }
  142. secretData[k], err = utils.GetByteValue(val.Value)
  143. if err != nil {
  144. return nil, fmt.Errorf(errUnableToGetValues, k, err)
  145. }
  146. }
  147. return secretData, nil
  148. }
  149. func (c *client) GetAllSecrets(_ context.Context, _ esv1.ExternalSecretFind) (map[string][]byte, error) {
  150. return nil, errors.New(errGettingAllSecretsNotSupported)
  151. }
  152. func (c *client) Close(context.Context) error {
  153. return nil
  154. }