client.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "context"
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "strings"
  19. "github.com/tidwall/gjson"
  20. v1 "k8s.io/api/core/v1"
  21. apierrors "k8s.io/apimachinery/pkg/api/errors"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. labels "k8s.io/apimachinery/pkg/labels"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. "github.com/external-secrets/external-secrets/pkg/find"
  26. "github.com/external-secrets/external-secrets/pkg/provider/metrics"
  27. "github.com/external-secrets/external-secrets/pkg/utils"
  28. )
  29. const (
  30. metaLabels = "labels"
  31. metaAnnotations = "annotations"
  32. )
  33. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  34. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  35. if err != nil {
  36. return nil, err
  37. }
  38. var values map[string][]byte
  39. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  40. values, err = getSecretMetadata(secret)
  41. if err != nil {
  42. return nil, err
  43. }
  44. } else {
  45. values = secret.Data
  46. }
  47. byteArr, err := getSecretValues(values, ref.MetadataPolicy)
  48. if err != nil {
  49. return nil, err
  50. }
  51. if ref.Property != "" {
  52. jsonStr := string(byteArr)
  53. // We need to search if a given key with a . exists before using gjson operations.
  54. idx := strings.Index(ref.Property, ".")
  55. if idx > -1 {
  56. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  57. val := gjson.Get(jsonStr, refProperty)
  58. if val.Exists() {
  59. return []byte(val.String()), nil
  60. }
  61. }
  62. val := gjson.Get(jsonStr, ref.Property)
  63. if !val.Exists() {
  64. return nil, fmt.Errorf("property %s does not exist in key %s", ref.Property, ref.Key)
  65. }
  66. return []byte(val.String()), nil
  67. }
  68. return byteArr, nil
  69. }
  70. func getSecretValues(secretMap map[string][]byte, policy esv1beta1.ExternalSecretMetadataPolicy) ([]byte, error) {
  71. var byteArr []byte
  72. var err error
  73. if policy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  74. data := make(map[string]json.RawMessage, len(secretMap))
  75. for k, v := range secretMap {
  76. data[k] = v
  77. }
  78. byteArr, err = json.Marshal(data)
  79. } else {
  80. strMap := make(map[string]string)
  81. for k, v := range secretMap {
  82. strMap[k] = string(v)
  83. }
  84. byteArr, err = json.Marshal(strMap)
  85. }
  86. if err != nil {
  87. return nil, fmt.Errorf("unabled to marshal json: %w", err)
  88. }
  89. return byteArr, nil
  90. }
  91. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  92. return fmt.Errorf("not implemented")
  93. }
  94. // Not Implemented PushSecret.
  95. func (c *Client) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  96. return fmt.Errorf("not implemented")
  97. }
  98. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  99. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  100. metrics.ObserveAPICall(metrics.ProviderKubernetes, metrics.CallKubernetesGetSecret, err)
  101. if apierrors.IsNotFound(err) {
  102. return nil, esv1beta1.NoSecretError{}
  103. }
  104. if err != nil {
  105. return nil, err
  106. }
  107. var tmpMap map[string][]byte
  108. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  109. tmpMap, err = getSecretMetadata(secret)
  110. if err != nil {
  111. return nil, err
  112. }
  113. } else {
  114. tmpMap = secret.Data
  115. }
  116. if ref.Property != "" {
  117. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  118. if err != nil {
  119. return nil, err
  120. }
  121. return retMap, nil
  122. }
  123. return tmpMap, nil
  124. }
  125. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  126. byteArr, err := json.Marshal(tmpMap)
  127. if err != nil {
  128. return nil, err
  129. }
  130. var retMap map[string][]byte
  131. jsonStr := string(byteArr)
  132. // We need to search if a given key with a . exists before using gjson operations.
  133. idx := strings.Index(property, ".")
  134. if idx > -1 {
  135. refProperty := strings.ReplaceAll(property, ".", "\\.")
  136. retMap, err = getMapFromValues(refProperty, jsonStr)
  137. if err != nil {
  138. return nil, err
  139. }
  140. if retMap != nil {
  141. return retMap, nil
  142. }
  143. }
  144. retMap, err = getMapFromValues(property, jsonStr)
  145. if err != nil {
  146. return nil, err
  147. }
  148. if retMap == nil {
  149. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  150. }
  151. return retMap, nil
  152. }
  153. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  154. val := gjson.Get(jsonStr, property)
  155. if val.Exists() {
  156. retMap := make(map[string][]byte)
  157. var tmpMap map[string]interface{}
  158. decoded, err := base64.StdEncoding.DecodeString(val.String())
  159. if err != nil {
  160. return nil, err
  161. }
  162. err = json.Unmarshal(decoded, &tmpMap)
  163. if err != nil {
  164. return nil, err
  165. }
  166. for k, v := range tmpMap {
  167. b, err := json.Marshal(v)
  168. if err != nil {
  169. return nil, err
  170. }
  171. retMap[k] = b
  172. }
  173. return retMap, nil
  174. }
  175. return nil, nil
  176. }
  177. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  178. var err error
  179. tmpMap := make(map[string][]byte)
  180. tmpMap[metaLabels], err = json.Marshal(secret.ObjectMeta.Labels)
  181. if err != nil {
  182. return nil, err
  183. }
  184. tmpMap[metaAnnotations], err = json.Marshal(secret.ObjectMeta.Annotations)
  185. if err != nil {
  186. return nil, err
  187. }
  188. return tmpMap, nil
  189. }
  190. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  191. if ref.Tags != nil {
  192. return c.findByTags(ctx, ref)
  193. }
  194. if ref.Name != nil {
  195. return c.findByName(ctx, ref)
  196. }
  197. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  198. }
  199. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  200. // empty/nil tags = everything
  201. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  202. if err != nil {
  203. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  204. }
  205. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  206. metrics.ObserveAPICall(metrics.ProviderKubernetes, metrics.CallKubernetesListSecrets, err)
  207. if err != nil {
  208. return nil, fmt.Errorf("unable to list secrets: %w", err)
  209. }
  210. data := make(map[string][]byte)
  211. for _, secret := range secrets.Items {
  212. jsonStr, err := json.Marshal(convertMap(secret.Data))
  213. if err != nil {
  214. return nil, err
  215. }
  216. data[secret.Name] = jsonStr
  217. }
  218. return utils.ConvertKeys(ref.ConversionStrategy, data)
  219. }
  220. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  221. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  222. metrics.ObserveAPICall(metrics.ProviderKubernetes, metrics.CallKubernetesListSecrets, err)
  223. if err != nil {
  224. return nil, fmt.Errorf("unable to list secrets: %w", err)
  225. }
  226. matcher, err := find.New(*ref.Name)
  227. if err != nil {
  228. return nil, err
  229. }
  230. data := make(map[string][]byte)
  231. for _, secret := range secrets.Items {
  232. if !matcher.MatchName(secret.Name) {
  233. continue
  234. }
  235. jsonStr, err := json.Marshal(convertMap(secret.Data))
  236. if err != nil {
  237. return nil, err
  238. }
  239. data[secret.Name] = jsonStr
  240. }
  241. return utils.ConvertKeys(ref.ConversionStrategy, data)
  242. }
  243. func (c Client) Close(ctx context.Context) error {
  244. return nil
  245. }
  246. func convertMap(in map[string][]byte) map[string]string {
  247. out := make(map[string]string)
  248. for k, v := range in {
  249. out[k] = string(v)
  250. }
  251. return out
  252. }