client_get_all_secrets.go 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package vault
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "strings"
  18. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  19. "github.com/external-secrets/external-secrets/pkg/constants"
  20. "github.com/external-secrets/external-secrets/pkg/find"
  21. "github.com/external-secrets/external-secrets/pkg/metrics"
  22. )
  23. const (
  24. errUnsupportedKvVersion = "cannot perform find operations with kv version v1"
  25. )
  26. // GetAllSecrets gets multiple secrets from the provider and loads into a kubernetes secret.
  27. // First load all secrets from secretStore path configuration
  28. // Then, gets secrets from a matching name or matching custom_metadata.
  29. func (c *client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  30. if c.store.Version == esv1beta1.VaultKVStoreV1 {
  31. return nil, errors.New(errUnsupportedKvVersion)
  32. }
  33. searchPath := ""
  34. if ref.Path != nil {
  35. searchPath = *ref.Path + "/"
  36. }
  37. potentialSecrets, err := c.listSecrets(ctx, searchPath)
  38. if err != nil {
  39. return nil, err
  40. }
  41. if ref.Name != nil {
  42. return c.findSecretsFromName(ctx, potentialSecrets, *ref.Name)
  43. }
  44. return c.findSecretsFromTags(ctx, potentialSecrets, ref.Tags)
  45. }
  46. func (c *client) findSecretsFromTags(ctx context.Context, candidates []string, tags map[string]string) (map[string][]byte, error) {
  47. secrets := make(map[string][]byte)
  48. for _, name := range candidates {
  49. match := true
  50. metadata, err := c.readSecretMetadata(ctx, name)
  51. if err != nil {
  52. return nil, err
  53. }
  54. for tk, tv := range tags {
  55. p, ok := metadata[tk]
  56. if !ok || p != tv {
  57. match = false
  58. break
  59. }
  60. }
  61. if match {
  62. secret, err := c.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  63. if errors.Is(err, esv1beta1.NoSecretError{}) {
  64. continue
  65. }
  66. if err != nil {
  67. return nil, err
  68. }
  69. if secret != nil {
  70. secrets[name] = secret
  71. }
  72. }
  73. }
  74. return secrets, nil
  75. }
  76. func (c *client) findSecretsFromName(ctx context.Context, candidates []string, ref esv1beta1.FindName) (map[string][]byte, error) {
  77. secrets := make(map[string][]byte)
  78. matcher, err := find.New(ref)
  79. if err != nil {
  80. return nil, err
  81. }
  82. for _, name := range candidates {
  83. ok := matcher.MatchName(name)
  84. if ok {
  85. secret, err := c.GetSecret(ctx, esv1beta1.ExternalSecretDataRemoteRef{Key: name})
  86. if errors.Is(err, esv1beta1.NoSecretError{}) {
  87. continue
  88. }
  89. if err != nil {
  90. return nil, err
  91. }
  92. if secret != nil {
  93. secrets[name] = secret
  94. }
  95. }
  96. }
  97. return secrets, nil
  98. }
  99. func (c *client) listSecrets(ctx context.Context, path string) ([]string, error) {
  100. secrets := make([]string, 0)
  101. url, err := c.buildMetadataPath(path)
  102. if err != nil {
  103. return nil, err
  104. }
  105. secret, err := c.logical.ListWithContext(ctx, url)
  106. metrics.ObserveAPICall(constants.ProviderHCVault, constants.CallHCVaultListSecrets, err)
  107. if err != nil {
  108. return nil, fmt.Errorf(errReadSecret, err)
  109. }
  110. if secret == nil {
  111. return nil, fmt.Errorf("provided path %v does not contain any secrets", url)
  112. }
  113. t, ok := secret.Data["keys"]
  114. if !ok {
  115. return nil, nil
  116. }
  117. paths := t.([]any)
  118. for _, p := range paths {
  119. strPath := p.(string)
  120. fullPath := path + strPath // because path always ends with a /
  121. if path == "" {
  122. fullPath = strPath
  123. }
  124. // Recurrently find secrets
  125. if !strings.HasSuffix(p.(string), "/") {
  126. secrets = append(secrets, fullPath)
  127. } else {
  128. partial, err := c.listSecrets(ctx, fullPath)
  129. if err != nil {
  130. return nil, err
  131. }
  132. secrets = append(secrets, partial...)
  133. }
  134. }
  135. return secrets, nil
  136. }