| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148 |
- /*
- Copyright © The ESO Authors
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- https://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package vault
- import (
- "context"
- "errors"
- "fmt"
- "strings"
- esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
- "github.com/external-secrets/external-secrets/runtime/constants"
- "github.com/external-secrets/external-secrets/runtime/find"
- "github.com/external-secrets/external-secrets/runtime/metrics"
- )
- const (
- errUnsupportedKvVersion = "cannot perform find by tag operations with kv version v1"
- )
- // GetAllSecrets gets multiple secrets from the provider and loads into a kubernetes secret.
- // First load all secrets from secretStore path configuration
- // Then, gets secrets from a matching name or matching custom_metadata.
- func (c *client) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
- if c.store.Version == esv1.VaultKVStoreV1 && ref.Tags != nil {
- return nil, errors.New(errUnsupportedKvVersion)
- }
- searchPath := ""
- if ref.Path != nil {
- searchPath = *ref.Path + "/"
- }
- potentialSecrets, err := c.listSecrets(ctx, searchPath)
- if err != nil {
- return nil, err
- }
- if ref.Name != nil {
- return c.findSecretsFromName(ctx, potentialSecrets, *ref.Name)
- }
- return c.findSecretsFromTags(ctx, potentialSecrets, ref.Tags)
- }
- func (c *client) findSecretsFromTags(ctx context.Context, candidates []string, tags map[string]string) (map[string][]byte, error) {
- secrets := make(map[string][]byte)
- for _, name := range candidates {
- match := true
- metadata, err := c.readSecretMetadata(ctx, name)
- if err != nil {
- return nil, err
- }
- for tk, tv := range tags {
- p, ok := metadata[tk]
- if !ok || p != tv {
- match = false
- break
- }
- }
- if match {
- secret, err := c.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: name})
- if errors.Is(err, esv1.NoSecretError{}) {
- continue
- }
- if err != nil {
- return nil, err
- }
- if secret != nil {
- secrets[name] = secret
- }
- }
- }
- return secrets, nil
- }
- func (c *client) findSecretsFromName(ctx context.Context, candidates []string, ref esv1.FindName) (map[string][]byte, error) {
- secrets := make(map[string][]byte)
- matcher, err := find.New(ref)
- if err != nil {
- return nil, err
- }
- for _, name := range candidates {
- ok := matcher.MatchName(name)
- if ok {
- secret, err := c.GetSecret(ctx, esv1.ExternalSecretDataRemoteRef{Key: name})
- if errors.Is(err, esv1.NoSecretError{}) {
- continue
- }
- if err != nil {
- return nil, err
- }
- if secret != nil {
- secrets[name] = secret
- }
- }
- }
- return secrets, nil
- }
- func (c *client) listSecrets(ctx context.Context, path string) ([]string, error) {
- secrets := make([]string, 0)
- url, err := c.buildMetadataPath(path)
- if err != nil {
- return nil, err
- }
- secret, err := c.logical.ListWithContext(ctx, url)
- metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultListSecrets, err)
- if err != nil {
- return nil, fmt.Errorf(errReadSecret, err)
- }
- if secret == nil {
- return nil, esv1.NoSecretError{}
- }
- t, ok := secret.Data["keys"]
- if !ok {
- return nil, nil
- }
- paths := t.([]any)
- for _, p := range paths {
- strPath := p.(string)
- fullPath := path + strPath // because path always ends with a /
- if path == "" {
- fullPath = strPath
- }
- // Recurrently find secrets
- if !strings.HasSuffix(p.(string), "/") {
- secrets = append(secrets, fullPath)
- } else {
- partial, err := c.listSecrets(ctx, fullPath)
- if err != nil {
- return nil, err
- }
- secrets = append(secrets, partial...)
- }
- }
- return secrets, nil
- }
|