gitlab.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package gitlab
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "sort"
  20. "strconv"
  21. "strings"
  22. "github.com/tidwall/gjson"
  23. gitlab "gitlab.com/gitlab-org/api/client-go"
  24. corev1 "k8s.io/api/core/v1"
  25. ctrl "sigs.k8s.io/controller-runtime"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. "github.com/external-secrets/external-secrets/pkg/constants"
  28. "github.com/external-secrets/external-secrets/pkg/find"
  29. "github.com/external-secrets/external-secrets/pkg/metrics"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  32. )
  33. const (
  34. errList = "could not verify whether the gitlabClient is valid: %w"
  35. errProjectAuth = "gitlabClient is not allowed to get secrets for project id [%s]"
  36. errGroupAuth = "gitlabClient is not allowed to get secrets for group id [%s]"
  37. errUninitializedGitlabProvider = "provider gitlab is not initialized"
  38. errNameNotDefined = "'find.name' is mandatory"
  39. errEnvironmentIsConstricted = "'find.tags' is constrained by 'environment_scope' of the store"
  40. errTagsOnlyEnvironmentSupported = "'find.tags' only supports 'environment_scope'"
  41. errPathNotImplemented = "'find.path' is not implemented in the GitLab provider"
  42. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  43. errNotImplemented = "not implemented"
  44. )
  45. // https://github.com/external-secrets/external-secrets/issues/644
  46. var _ esv1beta1.SecretsClient = &gitlabBase{}
  47. var _ esv1beta1.Provider = &Provider{}
  48. type ProjectsClient interface {
  49. ListProjectsGroups(pid any, opt *gitlab.ListProjectGroupOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.ProjectGroup, *gitlab.Response, error)
  50. }
  51. type ProjectVariablesClient interface {
  52. GetVariable(pid any, key string, opt *gitlab.GetProjectVariableOptions, options ...gitlab.RequestOptionFunc) (*gitlab.ProjectVariable, *gitlab.Response, error)
  53. ListVariables(pid any, opt *gitlab.ListProjectVariablesOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.ProjectVariable, *gitlab.Response, error)
  54. }
  55. type GroupVariablesClient interface {
  56. GetVariable(gid any, key string, opts *gitlab.GetGroupVariableOptions, options ...gitlab.RequestOptionFunc) (*gitlab.GroupVariable, *gitlab.Response, error)
  57. ListVariables(gid any, opt *gitlab.ListGroupVariablesOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.GroupVariable, *gitlab.Response, error)
  58. }
  59. type ProjectGroupPathSorter []*gitlab.ProjectGroup
  60. func (a ProjectGroupPathSorter) Len() int { return len(a) }
  61. func (a ProjectGroupPathSorter) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
  62. func (a ProjectGroupPathSorter) Less(i, j int) bool { return len(a[i].FullPath) < len(a[j].FullPath) }
  63. var log = ctrl.Log.WithName("provider").WithName("gitlab")
  64. // Set gitlabBase credentials to Access Token.
  65. func (g *gitlabBase) getAuth(ctx context.Context) (string, error) {
  66. return resolvers.SecretKeyRef(
  67. ctx,
  68. g.kube,
  69. g.storeKind,
  70. g.namespace,
  71. &g.store.Auth.SecretRef.AccessToken)
  72. }
  73. func (g *gitlabBase) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  74. return errors.New(errNotImplemented)
  75. }
  76. func (g *gitlabBase) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  77. return false, errors.New(errNotImplemented)
  78. }
  79. func (g *gitlabBase) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  80. return errors.New(errNotImplemented)
  81. }
  82. // GetAllSecrets syncs all gitlab project and group variables into a single Kubernetes Secret.
  83. func (g *gitlabBase) GetAllSecrets(_ context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  84. if utils.IsNil(g.projectVariablesClient) {
  85. return nil, errors.New(errUninitializedGitlabProvider)
  86. }
  87. var effectiveEnvironment = g.store.Environment
  88. if ref.Tags != nil {
  89. environment, err := ExtractTag(ref.Tags)
  90. if err != nil {
  91. return nil, err
  92. }
  93. if !isEmptyOrWildcard(effectiveEnvironment) && !isEmptyOrWildcard(environment) {
  94. return nil, errors.New(errEnvironmentIsConstricted)
  95. }
  96. effectiveEnvironment = environment
  97. }
  98. if ref.Path != nil {
  99. return nil, errors.New(errPathNotImplemented)
  100. }
  101. if ref.Name == nil {
  102. return nil, errors.New(errNameNotDefined)
  103. }
  104. var matcher *find.Matcher
  105. if ref.Name != nil {
  106. m, err := find.New(*ref.Name)
  107. if err != nil {
  108. return nil, err
  109. }
  110. matcher = m
  111. }
  112. err := g.ResolveGroupIds()
  113. if err != nil {
  114. return nil, err
  115. }
  116. secretData, err := g.fetchSecretData(effectiveEnvironment, matcher)
  117. if err != nil {
  118. return nil, err
  119. }
  120. // _Note_: fetchProjectVariables alters secret data map
  121. if err := g.fetchProjectVariables(effectiveEnvironment, matcher, secretData); err != nil {
  122. return nil, err
  123. }
  124. return secretData, nil
  125. }
  126. func (g *gitlabBase) fetchProjectVariables(effectiveEnvironment string, matcher *find.Matcher, secretData map[string][]byte) error {
  127. var popts = &gitlab.ListProjectVariablesOptions{PerPage: 100}
  128. for projectPage := 1; ; projectPage++ {
  129. popts.Page = projectPage
  130. projectData, response, err := g.projectVariablesClient.ListVariables(g.store.ProjectID, popts)
  131. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabProjectListVariables, err)
  132. if err != nil {
  133. return err
  134. }
  135. for _, data := range projectData {
  136. matching, key, isWildcard := matchesFilter(effectiveEnvironment, data.EnvironmentScope, data.Key, matcher)
  137. if !matching {
  138. continue
  139. }
  140. _, exists := secretData[key]
  141. if exists && isWildcard {
  142. continue
  143. }
  144. secretData[key] = []byte(data.Value)
  145. }
  146. if response.CurrentPage >= response.TotalPages {
  147. break
  148. }
  149. }
  150. return nil
  151. }
  152. func (g *gitlabBase) fetchSecretData(effectiveEnvironment string, matcher *find.Matcher) (map[string][]byte, error) {
  153. var gopts = &gitlab.ListGroupVariablesOptions{PerPage: 100}
  154. secretData := make(map[string][]byte)
  155. for _, groupID := range g.store.GroupIDs {
  156. if err := g.setVariablesForGroupID(effectiveEnvironment, matcher, gopts, groupID, secretData); err != nil {
  157. return nil, err
  158. }
  159. }
  160. return secretData, nil
  161. }
  162. func (g *gitlabBase) setVariablesForGroupID(
  163. effectiveEnvironment string,
  164. matcher *find.Matcher,
  165. gopts *gitlab.ListGroupVariablesOptions,
  166. groupID string,
  167. secretData map[string][]byte,
  168. ) error {
  169. for groupPage := 1; ; groupPage++ {
  170. gopts.Page = groupPage
  171. groupVars, response, err := g.groupVariablesClient.ListVariables(groupID, gopts)
  172. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupListVariables, err)
  173. if err != nil {
  174. return err
  175. }
  176. g.setGroupValues(effectiveEnvironment, matcher, groupVars, secretData)
  177. if response.CurrentPage >= response.TotalPages {
  178. break
  179. }
  180. }
  181. return nil
  182. }
  183. func (g *gitlabBase) setGroupValues(
  184. effectiveEnvironment string,
  185. matcher *find.Matcher,
  186. groupVars []*gitlab.GroupVariable,
  187. secretData map[string][]byte,
  188. ) {
  189. for _, data := range groupVars {
  190. matching, key, isWildcard := matchesFilter(effectiveEnvironment, data.EnvironmentScope, data.Key, matcher)
  191. if !matching && !isWildcard {
  192. continue
  193. }
  194. secretData[key] = []byte(data.Value)
  195. }
  196. }
  197. func ExtractTag(tags map[string]string) (string, error) {
  198. var environmentScope string
  199. for tag, value := range tags {
  200. if tag != "environment_scope" {
  201. return "", errors.New(errTagsOnlyEnvironmentSupported)
  202. }
  203. environmentScope = value
  204. }
  205. return environmentScope, nil
  206. }
  207. func (g *gitlabBase) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  208. if utils.IsNil(g.projectVariablesClient) || utils.IsNil(g.groupVariablesClient) {
  209. return nil, errors.New(errUninitializedGitlabProvider)
  210. }
  211. // Need to replace hyphens with underscores to work with GitLab API
  212. ref.Key = strings.ReplaceAll(ref.Key, "-", "_")
  213. // Retrieves a gitlab variable in the form
  214. // {
  215. // "key": "TEST_VARIABLE_1",
  216. // "variable_type": "env_var",
  217. // "value": "TEST_1",
  218. // "protected": false,
  219. // "masked": true,
  220. // "environment_scope": "*"
  221. // }
  222. var vopts *gitlab.GetProjectVariableOptions
  223. if g.store.Environment != "" {
  224. vopts = &gitlab.GetProjectVariableOptions{Filter: &gitlab.VariableFilter{EnvironmentScope: g.store.Environment}}
  225. }
  226. // _Note_: getVariables potentially alters vopts environment variable.
  227. data, resp, err := g.getVariables(ref, vopts)
  228. if err != nil && (resp == nil || resp.StatusCode != http.StatusNotFound) {
  229. return nil, err
  230. }
  231. err = g.ResolveGroupIds()
  232. if err != nil {
  233. return nil, err
  234. }
  235. var result []byte
  236. if resp.StatusCode < 300 {
  237. result, err = extractVariable(ref, data.Value)
  238. }
  239. for i := len(g.store.GroupIDs) - 1; i >= 0; i-- {
  240. groupID := g.store.GroupIDs[i]
  241. if result != nil {
  242. return result, nil
  243. }
  244. groupVar, resp, err := g.groupVariablesClient.GetVariable(groupID, ref.Key, nil)
  245. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupGetVariable, err)
  246. if resp.StatusCode >= 400 && resp.StatusCode != http.StatusNotFound && err != nil {
  247. return nil, err
  248. }
  249. if resp.StatusCode < 300 {
  250. result, _ = extractVariable(ref, groupVar.Value)
  251. }
  252. }
  253. if result != nil {
  254. return result, nil
  255. }
  256. return nil, err
  257. }
  258. func extractVariable(ref esv1beta1.ExternalSecretDataRemoteRef, value string) ([]byte, error) {
  259. if ref.Property == "" {
  260. if value != "" {
  261. return []byte(value), nil
  262. }
  263. return nil, fmt.Errorf("invalid secret received. no secret string for key: %s", ref.Key)
  264. }
  265. var payload string
  266. if value != "" {
  267. payload = value
  268. }
  269. val := gjson.Get(payload, ref.Property)
  270. if !val.Exists() {
  271. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  272. }
  273. return []byte(val.String()), nil
  274. }
  275. func (g *gitlabBase) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  276. // Gets a secret as normal, expecting secret value to be a json object
  277. data, err := g.GetSecret(ctx, ref)
  278. if err != nil {
  279. return nil, fmt.Errorf("error getting secret %s: %w", ref.Key, err)
  280. }
  281. // Maps the json data to a string:string map
  282. kv := make(map[string]string)
  283. err = json.Unmarshal(data, &kv)
  284. if err != nil {
  285. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  286. }
  287. // Converts values in K:V pairs into bytes, while leaving keys as strings
  288. secretData := make(map[string][]byte)
  289. for k, v := range kv {
  290. secretData[k] = []byte(v)
  291. }
  292. return secretData, nil
  293. }
  294. func isEmptyOrWildcard(environment string) bool {
  295. return environment == "" || environment == "*"
  296. }
  297. func matchesFilter(environment, varEnvironment, key string, matcher *find.Matcher) (bool, string, bool) {
  298. isWildcard := isEmptyOrWildcard(varEnvironment)
  299. if !isWildcard && !isEmptyOrWildcard(environment) {
  300. // as of now gitlab does not support filtering of EnvironmentScope through the api call
  301. if varEnvironment != environment {
  302. return false, "", isWildcard
  303. }
  304. }
  305. if key == "" || (matcher != nil && !matcher.MatchName(key)) {
  306. return false, "", isWildcard
  307. }
  308. return true, key, isWildcard
  309. }
  310. func (g *gitlabBase) Close(_ context.Context) error {
  311. return nil
  312. }
  313. func (g *gitlabBase) ResolveGroupIds() error {
  314. if g.store.InheritFromGroups {
  315. projectGroups, resp, err := g.projectsClient.ListProjectsGroups(g.store.ProjectID, nil)
  316. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabListProjectsGroups, err)
  317. if resp.StatusCode >= 400 && err != nil {
  318. return err
  319. }
  320. sort.Sort(ProjectGroupPathSorter(projectGroups))
  321. discoveredIds := make([]string, len(projectGroups))
  322. for i, group := range projectGroups {
  323. discoveredIds[i] = strconv.Itoa(group.ID)
  324. }
  325. g.store.GroupIDs = discoveredIds
  326. }
  327. return nil
  328. }
  329. // Validate will use the gitlab projectVariablesClient/groupVariablesClient to validate the gitlab provider using the ListVariable call to ensure get permissions without needing a specific key.
  330. func (g *gitlabBase) Validate() (esv1beta1.ValidationResult, error) {
  331. if g.store.ProjectID != "" {
  332. _, resp, err := g.projectVariablesClient.ListVariables(g.store.ProjectID, nil)
  333. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabProjectListVariables, err)
  334. if err != nil {
  335. return esv1beta1.ValidationResultError, fmt.Errorf(errList, err)
  336. } else if resp == nil || resp.StatusCode != http.StatusOK {
  337. return esv1beta1.ValidationResultError, fmt.Errorf(errProjectAuth, g.store.ProjectID)
  338. }
  339. err = g.ResolveGroupIds()
  340. if err != nil {
  341. return esv1beta1.ValidationResultError, fmt.Errorf(errList, err)
  342. }
  343. log.V(1).Info("discovered project groups", "name", g.store.GroupIDs)
  344. }
  345. if len(g.store.GroupIDs) > 0 {
  346. for _, groupID := range g.store.GroupIDs {
  347. _, resp, err := g.groupVariablesClient.ListVariables(groupID, nil)
  348. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupListVariables, err)
  349. if err != nil {
  350. return esv1beta1.ValidationResultError, fmt.Errorf(errList, err)
  351. } else if resp == nil || resp.StatusCode != http.StatusOK {
  352. return esv1beta1.ValidationResultError, fmt.Errorf(errGroupAuth, groupID)
  353. }
  354. }
  355. }
  356. return esv1beta1.ValidationResultReady, nil
  357. }