fake.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "fmt"
  16. "github.com/tidwall/gjson"
  17. "sigs.k8s.io/controller-runtime/pkg/client"
  18. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  19. )
  20. var (
  21. errMissingStore = fmt.Errorf("missing store provider")
  22. errMissingFakeProvider = fmt.Errorf("missing store provider fake")
  23. errMissingKeyField = "key must be set in data %v"
  24. errMissingValueField = "at least one of value or valueMap must be set in data %v"
  25. )
  26. type SourceOrigin string
  27. const (
  28. FakeSecretStore SourceOrigin = "SecretStore"
  29. FakeSetSecret SourceOrigin = "SetSecret"
  30. )
  31. type Data struct {
  32. Value string
  33. Version string
  34. ValueMap map[string]string
  35. Origin SourceOrigin
  36. }
  37. type Config map[string]*Data
  38. type Provider struct {
  39. config Config
  40. database map[string]Config
  41. }
  42. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  43. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  44. return esv1beta1.SecretStoreReadWrite
  45. }
  46. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  47. if p.database == nil {
  48. p.database = make(map[string]Config)
  49. }
  50. c, err := getProvider(store)
  51. if err != nil {
  52. return nil, err
  53. }
  54. cfg := p.database[store.GetName()]
  55. if cfg == nil {
  56. cfg = Config{}
  57. }
  58. // We want to remove any FakeSecretStore entry from memory
  59. // this will ensure SecretStores can delete from memory.
  60. for key, data := range cfg {
  61. if data.Origin == FakeSecretStore {
  62. delete(cfg, key)
  63. }
  64. }
  65. for _, data := range c.Data {
  66. mapKey := fmt.Sprintf("%v%v", data.Key, data.Version)
  67. cfg[mapKey] = &Data{
  68. Value: data.Value,
  69. Version: data.Version,
  70. Origin: FakeSecretStore,
  71. }
  72. if data.ValueMap != nil {
  73. cfg[mapKey].ValueMap = data.ValueMap
  74. }
  75. }
  76. p.database[store.GetName()] = cfg
  77. return &Provider{
  78. config: cfg,
  79. }, nil
  80. }
  81. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.FakeProvider, error) {
  82. if store == nil {
  83. return nil, errMissingStore
  84. }
  85. spc := store.GetSpec()
  86. if spc == nil || spc.Provider == nil || spc.Provider.Fake == nil {
  87. return nil, errMissingFakeProvider
  88. }
  89. return spc.Provider.Fake, nil
  90. }
  91. func (p *Provider) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  92. return nil
  93. }
  94. func (p *Provider) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  95. currentData, ok := p.config[remoteRef.GetRemoteKey()]
  96. if !ok {
  97. p.config[remoteRef.GetRemoteKey()] = &Data{
  98. Value: string(value),
  99. Origin: FakeSetSecret,
  100. }
  101. return nil
  102. }
  103. if currentData.Origin != FakeSetSecret {
  104. return fmt.Errorf("key already exists")
  105. }
  106. currentData.Value = string(value)
  107. return nil
  108. }
  109. // Empty GetAllSecrets.
  110. func (p *Provider) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  111. // TO be implemented
  112. return nil, fmt.Errorf("GetAllSecrets not implemented")
  113. }
  114. // GetSecret returns a single secret from the provider.
  115. func (p *Provider) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  116. mapKey := fmt.Sprintf("%v%v", ref.Key, ref.Version)
  117. data, ok := p.config[mapKey]
  118. if !ok || data.Version != ref.Version {
  119. return nil, esv1beta1.NoSecretErr
  120. }
  121. if ref.Property != "" {
  122. val := gjson.Get(data.Value, ref.Property)
  123. if !val.Exists() {
  124. return nil, esv1beta1.NoSecretErr
  125. }
  126. return []byte(val.String()), nil
  127. }
  128. return []byte(data.Value), nil
  129. }
  130. // GetSecretMap returns multiple k/v pairs from the provider.
  131. func (p *Provider) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  132. mapKey := fmt.Sprintf("%v%v", ref.Key, ref.Version)
  133. data, ok := p.config[mapKey]
  134. if !ok || data.Version != ref.Version || data.ValueMap == nil {
  135. return nil, esv1beta1.NoSecretErr
  136. }
  137. return convertMap(data.ValueMap), nil
  138. }
  139. func convertMap(in map[string]string) map[string][]byte {
  140. m := make(map[string][]byte)
  141. for k, v := range in {
  142. m[k] = []byte(v)
  143. }
  144. return m
  145. }
  146. func (p *Provider) Close(ctx context.Context) error {
  147. return nil
  148. }
  149. func (p *Provider) Validate() (esv1beta1.ValidationResult, error) {
  150. return esv1beta1.ValidationResultReady, nil
  151. }
  152. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  153. prov := store.GetSpec().Provider.Fake
  154. if prov == nil {
  155. return nil
  156. }
  157. for pos, data := range prov.Data {
  158. if data.Key == "" {
  159. return fmt.Errorf(errMissingKeyField, pos)
  160. }
  161. if data.Value == "" && data.ValueMap == nil {
  162. return fmt.Errorf(errMissingValueField, pos)
  163. }
  164. }
  165. return nil
  166. }
  167. func init() {
  168. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  169. Fake: &esv1beta1.FakeProvider{},
  170. })
  171. }