chef.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package chef implements a provider for Chef Infra Server secret management.
  14. package chef
  15. import (
  16. "context"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "net/url"
  21. "strings"
  22. "time"
  23. "github.com/external-secrets/external-secrets/pkg/metrics"
  24. "github.com/go-chef/chef"
  25. "github.com/go-logr/logr"
  26. "github.com/tidwall/gjson"
  27. corev1 "k8s.io/api/core/v1"
  28. "k8s.io/apimachinery/pkg/types"
  29. ctrl "sigs.k8s.io/controller-runtime"
  30. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  31. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  32. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  33. "github.com/external-secrets/external-secrets/pkg/esutils"
  34. )
  35. const (
  36. errChefStore = "received invalid Chef SecretStore resource: %w"
  37. errMissingStore = "missing store"
  38. errMissingStoreSpec = "missing store spec"
  39. errMissingProvider = "missing provider"
  40. errMissingChefProvider = "missing chef provider"
  41. errMissingUserName = "missing username"
  42. errMissingServerURL = "missing serverurl"
  43. errMissingAuth = "cannot initialize Chef Client: no valid authType was specified"
  44. errMissingSecretKey = "missing Secret Key"
  45. errInvalidClusterStoreMissingPKNamespace = "invalid ClusterSecretStore: missing privateKeySecretRef.Namespace"
  46. errFetchK8sSecret = "could not fetch SecretKey Secret: %w"
  47. errInvalidURL = "invalid serverurl: %w"
  48. errChefClient = "unable to create chef client: %w"
  49. errChefProvider = "missing or invalid spec: %w"
  50. errUninitalizedChefProvider = "chef provider is not initialized"
  51. errNoDatabagItemFound = "data bag item %s not found in data bag %s"
  52. errNoDatabagItemPropertyFound = "property %s not found in data bag item"
  53. errCannotListDataBagItems = "unable to list items in data bag %s, may be given data bag doesn't exists or it is empty"
  54. errUnableToConvertToJSON = "unable to convert databagItem into JSON"
  55. errInvalidFormat = "invalid key format in data section. Expected value 'databagName/databagItemName'"
  56. errStoreValidateFailed = "unable to validate provided store. Check if username, serverUrl and privateKey are correct"
  57. errServerURLNoEndSlash = "serverurl does not end with slash(/)"
  58. errInvalidDataform = "invalid key format in dataForm section. Expected only 'databagName'"
  59. errNotImplemented = "not implemented"
  60. // ProviderChef is the name of the Chef Infra Server provider.
  61. ProviderChef = "Chef"
  62. // CallChefGetDataBagItem is the metric name for getting a data bag item.
  63. CallChefGetDataBagItem = "GetDataBagItem"
  64. // CallChefListDataBagItems is the metric name for listing data bag items from a data bag.
  65. CallChefListDataBagItems = "ListDataBagItems"
  66. // CallChefGetUser is the metric name for getting user information.
  67. CallChefGetUser = "GetUser"
  68. )
  69. var contextTimeout = time.Second * 25
  70. // DatabagFetcher defines the interface for fetching data bags from Chef Infra Server.
  71. type DatabagFetcher interface {
  72. GetItem(databagName string, databagItem string) (item chef.DataBagItem, err error)
  73. ListItems(name string) (data *chef.DataBagListResult, err error)
  74. }
  75. // UserInterface defines the interface for interacting with Chef Infra Server users.
  76. type UserInterface interface {
  77. Get(name string) (user chef.User, err error)
  78. }
  79. // Providerchef implements the Provider interface for Chef Infra Server.
  80. type Providerchef struct {
  81. clientName string
  82. databagService DatabagFetcher
  83. userService UserInterface
  84. log logr.Logger
  85. }
  86. var _ esv1.SecretsClient = &Providerchef{}
  87. var _ esv1.Provider = &Providerchef{}
  88. func init() {
  89. esv1.Register(&Providerchef{}, &esv1.SecretStoreProvider{
  90. Chef: &esv1.ChefProvider{},
  91. }, esv1.MaintenanceStatusMaintained)
  92. }
  93. // NewClient creates a new Chef Infra Server client.
  94. func (providerchef *Providerchef) NewClient(ctx context.Context, store esv1.GenericStore, kube kclient.Client, namespace string) (esv1.SecretsClient, error) {
  95. chefProvider, err := getChefProvider(store)
  96. if err != nil {
  97. return nil, fmt.Errorf(errChefProvider, err)
  98. }
  99. credentialsSecret := &corev1.Secret{}
  100. objectKey := types.NamespacedName{
  101. Name: chefProvider.Auth.SecretRef.SecretKey.Name,
  102. Namespace: namespace,
  103. }
  104. if store.GetObjectKind().GroupVersionKind().Kind == esv1.ClusterSecretStoreKind {
  105. if chefProvider.Auth.SecretRef.SecretKey.Namespace == nil {
  106. return nil, errors.New(errInvalidClusterStoreMissingPKNamespace)
  107. }
  108. objectKey.Namespace = *chefProvider.Auth.SecretRef.SecretKey.Namespace
  109. }
  110. if err := kube.Get(ctx, objectKey, credentialsSecret); err != nil {
  111. return nil, fmt.Errorf(errFetchK8sSecret, err)
  112. }
  113. secretKey := credentialsSecret.Data[chefProvider.Auth.SecretRef.SecretKey.Key]
  114. if len(secretKey) == 0 {
  115. return nil, errors.New(errMissingSecretKey)
  116. }
  117. client, err := chef.NewClient(&chef.Config{
  118. Name: chefProvider.UserName,
  119. Key: string(secretKey),
  120. BaseURL: chefProvider.ServerURL,
  121. })
  122. if err != nil {
  123. return nil, fmt.Errorf(errChefClient, err)
  124. }
  125. providerchef.clientName = chefProvider.UserName
  126. providerchef.databagService = client.DataBags
  127. providerchef.userService = client.Users
  128. providerchef.log = ctrl.Log.WithName("provider").WithName("chef").WithName("secretsmanager")
  129. return providerchef, nil
  130. }
  131. // Close closes the client connection.
  132. func (providerchef *Providerchef) Close(_ context.Context) error {
  133. return nil
  134. }
  135. // Validate checks if the client is configured correctly
  136. // to be able to retrieve secrets from the provider.
  137. func (providerchef *Providerchef) Validate() (esv1.ValidationResult, error) {
  138. _, err := providerchef.userService.Get(providerchef.clientName)
  139. metrics.ObserveAPICall(ProviderChef, CallChefGetUser, err)
  140. if err != nil {
  141. return esv1.ValidationResultError, errors.New(errStoreValidateFailed)
  142. }
  143. return esv1.ValidationResultReady, nil
  144. }
  145. // GetAllSecrets Retrieves a map[string][]byte with the Databag names as key and the Databag's Items as secrets.
  146. func (providerchef *Providerchef) GetAllSecrets(_ context.Context, _ esv1.ExternalSecretFind) (map[string][]byte, error) {
  147. return nil, errors.New("dataFrom.find not suppported")
  148. }
  149. // GetSecret returns a databagItem present in the databag. format example: databagName/databagItemName.
  150. func (providerchef *Providerchef) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  151. if esutils.IsNil(providerchef.databagService) {
  152. return nil, errors.New(errUninitalizedChefProvider)
  153. }
  154. key := ref.Key
  155. databagName := ""
  156. databagItem := ""
  157. nameSplitted := strings.Split(key, "/")
  158. if len(nameSplitted) > 1 {
  159. databagName = nameSplitted[0]
  160. databagItem = nameSplitted[1]
  161. }
  162. providerchef.log.Info("fetching secret value", "databag Name:", databagName, "databag Item:", databagItem)
  163. if databagName != "" && databagItem != "" {
  164. return getSingleDatabagItemWithContext(ctx, providerchef, databagName, databagItem, ref.Property)
  165. }
  166. return nil, errors.New(errInvalidFormat)
  167. }
  168. func getSingleDatabagItemWithContext(ctx context.Context, providerchef *Providerchef, dataBagName, databagItemName, propertyName string) ([]byte, error) {
  169. ctxWithTimeout, cancel := context.WithTimeout(ctx, contextTimeout)
  170. defer cancel()
  171. type result = struct {
  172. values []byte
  173. err error
  174. }
  175. getWithTimeout := func() chan result {
  176. resultChan := make(chan result, 1)
  177. go func() {
  178. defer close(resultChan)
  179. ditem, err := providerchef.databagService.GetItem(dataBagName, databagItemName)
  180. metrics.ObserveAPICall(ProviderChef, CallChefGetDataBagItem, err)
  181. if err != nil {
  182. resultChan <- result{err: fmt.Errorf(errNoDatabagItemFound, databagItemName, dataBagName)}
  183. return
  184. }
  185. jsonByte, err := json.Marshal(ditem)
  186. if err != nil {
  187. resultChan <- result{err: errors.New(errUnableToConvertToJSON)}
  188. return
  189. }
  190. if propertyName != "" {
  191. propertyValue, err := getPropertyFromDatabagItem(jsonByte, propertyName)
  192. if err != nil {
  193. resultChan <- result{err: err}
  194. return
  195. }
  196. resultChan <- result{values: propertyValue}
  197. } else {
  198. resultChan <- result{values: jsonByte}
  199. }
  200. }()
  201. return resultChan
  202. }
  203. select {
  204. case <-ctxWithTimeout.Done():
  205. return nil, ctxWithTimeout.Err()
  206. case r := <-getWithTimeout():
  207. if r.err != nil {
  208. return nil, r.err
  209. }
  210. return r.values, nil
  211. }
  212. }
  213. /*
  214. A path is a series of keys separated by a dot.
  215. A key may contain special wildcard characters '*' and '?'.
  216. To access an array value use the index as the key.
  217. To get the number of elements in an array or to access a child path, use the '#' character.
  218. The dot and wildcard characters can be escaped with '\'.
  219. refer https://github.com/tidwall/gjson#:~:text=JSON%20byte%20slices.-,Path%20Syntax,-Below%20is%20a
  220. */
  221. func getPropertyFromDatabagItem(jsonByte []byte, propertyName string) ([]byte, error) {
  222. result := gjson.GetBytes(jsonByte, propertyName)
  223. if !result.Exists() {
  224. return nil, fmt.Errorf(errNoDatabagItemPropertyFound, propertyName)
  225. }
  226. return []byte(result.Str), nil
  227. }
  228. // GetSecretMap returns multiple k/v pairs from the provider, for dataFrom.extract.key
  229. // dataFrom.extract.key only accepts dataBagName, example : dataFrom.extract.key: myDatabag
  230. // databagItemName or Property not expected in key.
  231. func (providerchef *Providerchef) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  232. if esutils.IsNil(providerchef.databagService) {
  233. return nil, errors.New(errUninitalizedChefProvider)
  234. }
  235. databagName := ref.Key
  236. if strings.Contains(databagName, "/") {
  237. return nil, errors.New(errInvalidDataform)
  238. }
  239. getAllSecrets := make(map[string][]byte)
  240. providerchef.log.Info("fetching all items from", "databag:", databagName)
  241. dataItems, err := providerchef.databagService.ListItems(databagName)
  242. metrics.ObserveAPICall(ProviderChef, CallChefListDataBagItems, err)
  243. if err != nil {
  244. return nil, fmt.Errorf(errCannotListDataBagItems, databagName)
  245. }
  246. for dataItem := range *dataItems {
  247. dItem, err := getSingleDatabagItemWithContext(ctx, providerchef, databagName, dataItem, "")
  248. if err != nil {
  249. return nil, fmt.Errorf(errNoDatabagItemFound, dataItem, databagName)
  250. }
  251. getAllSecrets[dataItem] = dItem
  252. }
  253. return getAllSecrets, nil
  254. }
  255. // ValidateStore checks if the provided store is valid.
  256. func (providerchef *Providerchef) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  257. chefProvider, err := getChefProvider(store)
  258. if err != nil {
  259. return nil, fmt.Errorf(errChefStore, err)
  260. }
  261. // check namespace compared to kind
  262. if err := esutils.ValidateSecretSelector(store, chefProvider.Auth.SecretRef.SecretKey); err != nil {
  263. return nil, fmt.Errorf(errChefStore, err)
  264. }
  265. return nil, nil
  266. }
  267. // getChefProvider validates the incoming store and return the chef provider.
  268. func getChefProvider(store esv1.GenericStore) (*esv1.ChefProvider, error) {
  269. if store == nil {
  270. return nil, errors.New(errMissingStore)
  271. }
  272. storeSpec := store.GetSpec()
  273. if storeSpec == nil {
  274. return nil, errors.New(errMissingStoreSpec)
  275. }
  276. provider := storeSpec.Provider
  277. if provider == nil {
  278. return nil, errors.New(errMissingProvider)
  279. }
  280. chefProvider := storeSpec.Provider.Chef
  281. if chefProvider == nil {
  282. return nil, errors.New(errMissingChefProvider)
  283. }
  284. if chefProvider.UserName == "" {
  285. return chefProvider, errors.New(errMissingUserName)
  286. }
  287. if chefProvider.ServerURL == "" {
  288. return chefProvider, errors.New(errMissingServerURL)
  289. }
  290. if !strings.HasSuffix(chefProvider.ServerURL, "/") {
  291. return chefProvider, errors.New(errServerURLNoEndSlash)
  292. }
  293. // check valid URL
  294. if _, err := url.ParseRequestURI(chefProvider.ServerURL); err != nil {
  295. return chefProvider, fmt.Errorf(errInvalidURL, err)
  296. }
  297. if chefProvider.Auth == nil {
  298. return chefProvider, errors.New(errMissingAuth)
  299. }
  300. if chefProvider.Auth.SecretRef.SecretKey.Key == "" {
  301. return chefProvider, errors.New(errMissingSecretKey)
  302. }
  303. return chefProvider, nil
  304. }
  305. // DeleteSecret implements the delete operation for Chef Infra Server secrets. Currently not implemented.
  306. func (providerchef *Providerchef) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  307. return errors.New(errNotImplemented)
  308. }
  309. // PushSecret implements the push operation for Chef Infra Server secrets. Currently not implemented.
  310. func (providerchef *Providerchef) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1.PushSecretData) error {
  311. return errors.New(errNotImplemented)
  312. }
  313. // SecretExists checks if a secret exists in Chef Infra Server.
  314. func (providerchef *Providerchef) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  315. return false, errors.New(errNotImplemented)
  316. }
  317. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  318. func (providerchef *Providerchef) Capabilities() esv1.SecretStoreCapabilities {
  319. return esv1.SecretStoreReadOnly
  320. }