lockboxsecretgetter.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package lockbox
  14. import (
  15. "context"
  16. "encoding/json"
  17. "fmt"
  18. "github.com/yandex-cloud/go-genproto/yandex/cloud/lockbox/v1"
  19. "github.com/external-secrets/external-secrets/providers/v1/yandex/common"
  20. "github.com/external-secrets/external-secrets/providers/v1/yandex/lockbox/client"
  21. )
  22. // Implementation of ydxcommon.SecretGetter.
  23. type lockboxSecretGetter struct {
  24. lockboxClient client.LockboxClient
  25. }
  26. func newLockboxSecretGetter(lockboxClient client.LockboxClient) (ydxcommon.SecretGetter, error) {
  27. return &lockboxSecretGetter{
  28. lockboxClient: lockboxClient,
  29. }, nil
  30. }
  31. func (g *lockboxSecretGetter) GetSecret(ctx context.Context, iamToken, resourceKey string, resourceKeyType ydxcommon.ResourceKeyType, folderID, versionID, property string) ([]byte, error) {
  32. entries, err := g.fetchPayloadEntries(ctx, iamToken, resourceKey, resourceKeyType, folderID, versionID)
  33. if err != nil {
  34. return nil, fmt.Errorf("unable to request secret payload to get secret: %w", err)
  35. }
  36. if property == "" {
  37. keyToValue := make(map[string]any, len(entries))
  38. for _, entry := range entries {
  39. value, err := getValueAsIs(entry)
  40. if err != nil {
  41. return nil, err
  42. }
  43. keyToValue[entry.Key] = value
  44. }
  45. out, err := json.Marshal(keyToValue)
  46. if err != nil {
  47. return nil, fmt.Errorf("failed to marshal secret: %w", err)
  48. }
  49. return out, nil
  50. }
  51. entry, err := findEntryByKey(entries, property)
  52. if err != nil {
  53. return nil, err
  54. }
  55. return getValueAsBinary(entry)
  56. }
  57. func (g *lockboxSecretGetter) GetSecretMap(ctx context.Context, iamToken, resourceKey string, resourceKeyType ydxcommon.ResourceKeyType, folderID, versionID string) (map[string][]byte, error) {
  58. entries, err := g.fetchPayloadEntries(ctx, iamToken, resourceKey, resourceKeyType, folderID, versionID)
  59. if err != nil {
  60. return nil, fmt.Errorf("unable to request secret payload to get secret map: %w", err)
  61. }
  62. secretMap := make(map[string][]byte, len(entries))
  63. for _, entry := range entries {
  64. value, err := getValueAsBinary(entry)
  65. if err != nil {
  66. return nil, err
  67. }
  68. secretMap[entry.Key] = value
  69. }
  70. return secretMap, nil
  71. }
  72. func (g *lockboxSecretGetter) fetchPayloadEntries(ctx context.Context, iamToken, resourceKey string, resourceKeyType ydxcommon.ResourceKeyType, folderID, versionID string) ([]*lockbox.Payload_Entry, error) {
  73. switch resourceKeyType {
  74. case ydxcommon.ResourceKeyTypeID:
  75. return g.lockboxClient.GetPayloadEntries(ctx, iamToken, resourceKey, versionID)
  76. case ydxcommon.ResourceKeyTypeName:
  77. entriesMap, err := g.lockboxClient.GetExPayload(ctx, iamToken, folderID, resourceKey, versionID)
  78. if err != nil {
  79. return nil, err
  80. }
  81. return convertToPayloadEntries(entriesMap), nil
  82. default:
  83. return nil, fmt.Errorf("unsupported resource key type: %v", resourceKeyType)
  84. }
  85. }
  86. func getValueAsIs(entry *lockbox.Payload_Entry) (any, error) {
  87. switch entry.Value.(type) {
  88. case *lockbox.Payload_Entry_TextValue:
  89. return entry.GetTextValue(), nil
  90. case *lockbox.Payload_Entry_BinaryValue:
  91. return entry.GetBinaryValue(), nil
  92. default:
  93. return nil, fmt.Errorf("unsupported payload value type, key: %v", entry.Key)
  94. }
  95. }
  96. func getValueAsBinary(entry *lockbox.Payload_Entry) ([]byte, error) {
  97. switch entry.Value.(type) {
  98. case *lockbox.Payload_Entry_TextValue:
  99. return []byte(entry.GetTextValue()), nil
  100. case *lockbox.Payload_Entry_BinaryValue:
  101. return entry.GetBinaryValue(), nil
  102. default:
  103. return nil, fmt.Errorf("unsupported payload value type, key: %v", entry.Key)
  104. }
  105. }
  106. func findEntryByKey(entries []*lockbox.Payload_Entry, key string) (*lockbox.Payload_Entry, error) {
  107. for i := range entries {
  108. if entries[i].Key == key {
  109. return entries[i], nil
  110. }
  111. }
  112. return nil, fmt.Errorf("payload entry with key '%s' not found", key)
  113. }
  114. func convertToPayloadEntries(entriesMap map[string][]byte) []*lockbox.Payload_Entry {
  115. entries := make([]*lockbox.Payload_Entry, 0, len(entriesMap))
  116. for key, value := range entriesMap {
  117. entries = append(entries, &lockbox.Payload_Entry{
  118. Key: key,
  119. Value: &lockbox.Payload_Entry_BinaryValue{BinaryValue: value},
  120. })
  121. }
  122. return entries
  123. }