utils.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package utils
  13. import (
  14. "bytes"
  15. "crypto/md5" //nolint:gosec
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net"
  21. "net/url"
  22. "reflect"
  23. "regexp"
  24. "strings"
  25. tpl "text/template"
  26. "time"
  27. "unicode"
  28. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  29. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  30. "github.com/external-secrets/external-secrets/pkg/template/v2"
  31. )
  32. const (
  33. errParse = "unable to parse transform template: %s"
  34. errExecute = "unable to execute transform template: %s"
  35. )
  36. // JSONMarshal takes an interface and returns a new escaped and encoded byte slice.
  37. func JSONMarshal(t interface{}) ([]byte, error) {
  38. buffer := &bytes.Buffer{}
  39. encoder := json.NewEncoder(buffer)
  40. encoder.SetEscapeHTML(false)
  41. err := encoder.Encode(t)
  42. return bytes.TrimRight(buffer.Bytes(), "\n"), err
  43. }
  44. // MergeByteMap merges map of byte slices.
  45. func MergeByteMap(dst, src map[string][]byte) map[string][]byte {
  46. for k, v := range src {
  47. dst[k] = v
  48. }
  49. return dst
  50. }
  51. func RewriteMap(operations []esv1beta1.ExternalSecretRewrite, in map[string][]byte) (map[string][]byte, error) {
  52. out := in
  53. var err error
  54. for i, op := range operations {
  55. if op.Regexp != nil {
  56. out, err = RewriteRegexp(*op.Regexp, out)
  57. if err != nil {
  58. return nil, fmt.Errorf("failed rewriting regexp operation[%v]: %w", i, err)
  59. }
  60. }
  61. if op.Transform != nil {
  62. out, err = RewriteTransform(*op.Transform, out)
  63. if err != nil {
  64. return nil, fmt.Errorf("failed rewriting transform operation[%v]: %w", i, err)
  65. }
  66. }
  67. }
  68. return out, nil
  69. }
  70. // RewriteRegexp rewrites a single Regexp Rewrite Operation.
  71. func RewriteRegexp(operation esv1beta1.ExternalSecretRewriteRegexp, in map[string][]byte) (map[string][]byte, error) {
  72. out := make(map[string][]byte)
  73. re, err := regexp.Compile(operation.Source)
  74. if err != nil {
  75. return nil, err
  76. }
  77. for key, value := range in {
  78. newKey := re.ReplaceAllString(key, operation.Target)
  79. out[newKey] = value
  80. }
  81. return out, nil
  82. }
  83. // RewriteTransform applies string transformation on each secret key name to rewrite.
  84. func RewriteTransform(operation esv1beta1.ExtermalSecretRewriteTransform, in map[string][]byte) (map[string][]byte, error) {
  85. out := make(map[string][]byte)
  86. for key, value := range in {
  87. data := map[string][]byte{
  88. "value": []byte(key),
  89. }
  90. result, err := transform(operation.Template, data)
  91. if err != nil {
  92. return nil, err
  93. }
  94. newKey := string(result)
  95. out[newKey] = value
  96. }
  97. return out, nil
  98. }
  99. func transform(val string, data map[string][]byte) ([]byte, error) {
  100. strValData := make(map[string]string, len(data))
  101. for k := range data {
  102. strValData[k] = string(data[k])
  103. }
  104. t, err := tpl.New("transform").
  105. Funcs(template.FuncMap()).
  106. Parse(val)
  107. if err != nil {
  108. return nil, fmt.Errorf(errParse, err)
  109. }
  110. buf := bytes.NewBuffer(nil)
  111. err = t.Execute(buf, strValData)
  112. if err != nil {
  113. return nil, fmt.Errorf(errExecute, err)
  114. }
  115. return buf.Bytes(), nil
  116. }
  117. // DecodeValues decodes values from a secretMap.
  118. func DecodeMap(strategy esv1beta1.ExternalSecretDecodingStrategy, in map[string][]byte) (map[string][]byte, error) {
  119. out := make(map[string][]byte, len(in))
  120. for k, v := range in {
  121. val, err := Decode(strategy, v)
  122. if err != nil {
  123. return nil, fmt.Errorf("failure decoding key %v: %w", k, err)
  124. }
  125. out[k] = val
  126. }
  127. return out, nil
  128. }
  129. func Decode(strategy esv1beta1.ExternalSecretDecodingStrategy, in []byte) ([]byte, error) {
  130. switch strategy {
  131. case esv1beta1.ExternalSecretDecodeBase64:
  132. out, err := base64.StdEncoding.DecodeString(string(in))
  133. if err != nil {
  134. return nil, err
  135. }
  136. return out, nil
  137. case esv1beta1.ExternalSecretDecodeBase64URL:
  138. out, err := base64.URLEncoding.DecodeString(string(in))
  139. if err != nil {
  140. return nil, err
  141. }
  142. return out, nil
  143. case esv1beta1.ExternalSecretDecodeNone:
  144. return in, nil
  145. // default when stored version is v1alpha1
  146. case "":
  147. return in, nil
  148. case esv1beta1.ExternalSecretDecodeAuto:
  149. out, err := Decode(esv1beta1.ExternalSecretDecodeBase64, in)
  150. if err != nil {
  151. out, err := Decode(esv1beta1.ExternalSecretDecodeBase64URL, in)
  152. if err != nil {
  153. return Decode(esv1beta1.ExternalSecretDecodeNone, in)
  154. }
  155. return out, nil
  156. }
  157. return out, nil
  158. default:
  159. return nil, fmt.Errorf("decoding strategy %v is not supported", strategy)
  160. }
  161. }
  162. func ValidateKeys(in map[string][]byte) bool {
  163. for key := range in {
  164. for _, v := range key {
  165. if !unicode.IsNumber(v) &&
  166. !unicode.IsLetter(v) &&
  167. v != '-' &&
  168. v != '.' &&
  169. v != '_' {
  170. return false
  171. }
  172. }
  173. }
  174. return true
  175. }
  176. // ConvertKeys converts a secret map into a valid key.
  177. // Replaces any non-alphanumeric characters depending on convert strategy.
  178. func ConvertKeys(strategy esv1beta1.ExternalSecretConversionStrategy, in map[string][]byte) (map[string][]byte, error) {
  179. out := make(map[string][]byte, len(in))
  180. for k, v := range in {
  181. key := convert(strategy, k)
  182. if _, exists := out[key]; exists {
  183. return nil, fmt.Errorf("secret name collision during conversion: %s", key)
  184. }
  185. out[key] = v
  186. }
  187. return out, nil
  188. }
  189. func convert(strategy esv1beta1.ExternalSecretConversionStrategy, str string) string {
  190. rs := []rune(str)
  191. newName := make([]string, len(rs))
  192. for rk, rv := range rs {
  193. if !unicode.IsNumber(rv) &&
  194. !unicode.IsLetter(rv) &&
  195. rv != '-' &&
  196. rv != '.' &&
  197. rv != '_' {
  198. switch strategy {
  199. case esv1beta1.ExternalSecretConversionDefault:
  200. newName[rk] = "_"
  201. case esv1beta1.ExternalSecretConversionUnicode:
  202. newName[rk] = fmt.Sprintf("_U%04x_", rv)
  203. default:
  204. newName[rk] = string(rv)
  205. }
  206. } else {
  207. newName[rk] = string(rv)
  208. }
  209. }
  210. return strings.Join(newName, "")
  211. }
  212. // MergeStringMap performs a deep clone from src to dest.
  213. func MergeStringMap(dest, src map[string]string) {
  214. for k, v := range src {
  215. dest[k] = v
  216. }
  217. }
  218. // IsNil checks if an Interface is nil.
  219. func IsNil(i interface{}) bool {
  220. if i == nil {
  221. return true
  222. }
  223. value := reflect.ValueOf(i)
  224. if value.Type().Kind() == reflect.Ptr {
  225. return value.IsNil()
  226. }
  227. return false
  228. }
  229. // ObjectHash calculates md5 sum of the data contained in the secret.
  230. //
  231. //nolint:gosec
  232. func ObjectHash(object interface{}) string {
  233. textualVersion := fmt.Sprintf("%+v", object)
  234. return fmt.Sprintf("%x", md5.Sum([]byte(textualVersion)))
  235. }
  236. func ErrorContains(out error, want string) bool {
  237. if out == nil {
  238. return want == ""
  239. }
  240. if want == "" {
  241. return false
  242. }
  243. return strings.Contains(out.Error(), want)
  244. }
  245. var (
  246. errNamespaceNotAllowed = errors.New("namespace not allowed with namespaced SecretStore")
  247. errRequireNamespace = errors.New("cluster scope requires namespace")
  248. )
  249. // ValidateSecretSelector just checks if the namespace field is present/absent
  250. // depending on the secret store type.
  251. // We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
  252. func ValidateSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
  253. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  254. if clusterScope && ref.Namespace == nil {
  255. return errRequireNamespace
  256. }
  257. if !clusterScope && ref.Namespace != nil {
  258. return errNamespaceNotAllowed
  259. }
  260. return nil
  261. }
  262. // ValidateReferentSecretSelector allows
  263. // cluster scoped store without namespace
  264. // this should replace above ValidateServiceAccountSelector once all providers
  265. // support referent auth.
  266. func ValidateReferentSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
  267. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  268. if !clusterScope && ref.Namespace != nil {
  269. return errNamespaceNotAllowed
  270. }
  271. return nil
  272. }
  273. // ValidateServiceAccountSelector just checks if the namespace field is present/absent
  274. // depending on the secret store type.
  275. // We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
  276. func ValidateServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
  277. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  278. if clusterScope && ref.Namespace == nil {
  279. return errRequireNamespace
  280. }
  281. if !clusterScope && ref.Namespace != nil {
  282. return errNamespaceNotAllowed
  283. }
  284. return nil
  285. }
  286. // ValidateReferentServiceAccountSelector allows
  287. // cluster scoped store without namespace
  288. // this should replace above ValidateServiceAccountSelector once all providers
  289. // support referent auth.
  290. func ValidateReferentServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
  291. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  292. if !clusterScope && ref.Namespace != nil {
  293. return errNamespaceNotAllowed
  294. }
  295. return nil
  296. }
  297. func NetworkValidate(endpoint string, timeout time.Duration) error {
  298. hostname, err := url.Parse(endpoint)
  299. if err != nil {
  300. return fmt.Errorf("could not parse url: %w", err)
  301. }
  302. host := hostname.Hostname()
  303. port := hostname.Port()
  304. if port == "" {
  305. port = "443"
  306. }
  307. url := fmt.Sprintf("%v:%v", host, port)
  308. conn, err := net.DialTimeout("tcp", url, timeout)
  309. if err != nil {
  310. return fmt.Errorf("error accessing external store: %w", err)
  311. }
  312. defer conn.Close()
  313. return nil
  314. }
  315. func Deref[V any](v *V) V {
  316. if v == nil {
  317. // Create zero value
  318. var res V
  319. return res
  320. }
  321. return *v
  322. }
  323. func Ptr[T any](i T) *T {
  324. return &i
  325. }
  326. func ConvertToType[T any](obj interface{}) (T, error) {
  327. var v T
  328. data, err := json.Marshal(obj)
  329. if err != nil {
  330. return v, fmt.Errorf("failed to marshal object: %w", err)
  331. }
  332. if err = json.Unmarshal(data, &v); err != nil {
  333. return v, fmt.Errorf("failed to unmarshal object: %w", err)
  334. }
  335. return v, nil
  336. }