webhook.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package webhook
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/tls"
  17. "crypto/x509"
  18. "fmt"
  19. "io"
  20. "net/http"
  21. "net/url"
  22. "strings"
  23. tpl "text/template"
  24. "time"
  25. "github.com/PaesslerAG/jsonpath"
  26. "gopkg.in/yaml.v3"
  27. corev1 "k8s.io/api/core/v1"
  28. "sigs.k8s.io/controller-runtime/pkg/client"
  29. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  30. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  31. "github.com/external-secrets/external-secrets/pkg/provider/metrics"
  32. "github.com/external-secrets/external-secrets/pkg/template/v2"
  33. "github.com/external-secrets/external-secrets/pkg/utils"
  34. )
  35. // https://github.com/external-secrets/external-secrets/issues/644
  36. var _ esv1beta1.SecretsClient = &WebHook{}
  37. var _ esv1beta1.Provider = &Provider{}
  38. // Provider satisfies the provider interface.
  39. type Provider struct{}
  40. type WebHook struct {
  41. kube client.Client
  42. store esv1beta1.GenericStore
  43. namespace string
  44. storeKind string
  45. http *http.Client
  46. url string
  47. }
  48. func init() {
  49. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  50. Webhook: &esv1beta1.WebhookProvider{},
  51. })
  52. }
  53. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  54. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  55. return esv1beta1.SecretStoreReadOnly
  56. }
  57. func (p *Provider) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube client.Client, namespace string) (esv1beta1.SecretsClient, error) {
  58. whClient := &WebHook{
  59. kube: kube,
  60. store: store,
  61. namespace: namespace,
  62. storeKind: store.GetObjectKind().GroupVersionKind().Kind,
  63. }
  64. provider, err := getProvider(store)
  65. if err != nil {
  66. return nil, err
  67. }
  68. whClient.url = provider.URL
  69. whClient.http, err = whClient.getHTTPClient(provider)
  70. if err != nil {
  71. return nil, err
  72. }
  73. return whClient, nil
  74. }
  75. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  76. return nil
  77. }
  78. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.WebhookProvider, error) {
  79. spc := store.GetSpec()
  80. if spc == nil || spc.Provider == nil || spc.Provider.Webhook == nil {
  81. return nil, fmt.Errorf("missing store provider webhook")
  82. }
  83. return spc.Provider.Webhook, nil
  84. }
  85. func (w *WebHook) getStoreSecret(ctx context.Context, ref esmeta.SecretKeySelector) (*corev1.Secret, error) {
  86. ke := client.ObjectKey{
  87. Name: ref.Name,
  88. Namespace: w.namespace,
  89. }
  90. if w.storeKind == esv1beta1.ClusterSecretStoreKind {
  91. if ref.Namespace == nil {
  92. return nil, fmt.Errorf("no namespace on ClusterSecretStore webhook secret %s", ref.Name)
  93. }
  94. ke.Namespace = *ref.Namespace
  95. }
  96. secret := &corev1.Secret{}
  97. if err := w.kube.Get(ctx, ke, secret); err != nil {
  98. return nil, fmt.Errorf("failed to get clustersecretstore webhook secret %s: %w", ref.Name, err)
  99. }
  100. return secret, nil
  101. }
  102. func (w *WebHook) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
  103. return fmt.Errorf("not implemented")
  104. }
  105. // Not Implemented PushSecret.
  106. func (w *WebHook) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
  107. return fmt.Errorf("not implemented")
  108. }
  109. // Empty GetAllSecrets.
  110. func (w *WebHook) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  111. // TO be implemented
  112. return nil, fmt.Errorf("GetAllSecrets not implemented")
  113. }
  114. func (w *WebHook) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  115. provider, err := getProvider(w.store)
  116. if err != nil {
  117. return nil, fmt.Errorf("failed to get store: %w", err)
  118. }
  119. result, err := w.getWebhookData(ctx, provider, ref)
  120. if err != nil {
  121. return nil, err
  122. }
  123. // Only parse as json if we have a jsonpath set
  124. data, err := w.getTemplateData(ctx, ref, provider.Secrets)
  125. if err != nil {
  126. return nil, err
  127. }
  128. resultJSONPath, err := executeTemplateString(provider.Result.JSONPath, data)
  129. if err != nil {
  130. return nil, err
  131. }
  132. if resultJSONPath != "" {
  133. jsondata := interface{}(nil)
  134. if err := yaml.Unmarshal(result, &jsondata); err != nil {
  135. return nil, fmt.Errorf("failed to parse response json: %w", err)
  136. }
  137. jsondata, err = jsonpath.Get(resultJSONPath, jsondata)
  138. if err != nil {
  139. return nil, fmt.Errorf("failed to get response path %s: %w", resultJSONPath, err)
  140. }
  141. jsonvalue, ok := jsondata.(string)
  142. if !ok {
  143. jsonvalues, ok := jsondata.([]interface{})
  144. if !ok {
  145. return nil, fmt.Errorf("failed to get response (wrong type: %T)", jsondata)
  146. }
  147. if len(jsonvalues) == 0 {
  148. return nil, fmt.Errorf("filter worked but didn't get any result")
  149. }
  150. jsonvalue = jsonvalues[0].(string)
  151. }
  152. return []byte(jsonvalue), nil
  153. }
  154. return result, nil
  155. }
  156. func (w *WebHook) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  157. provider, err := getProvider(w.store)
  158. if err != nil {
  159. return nil, fmt.Errorf("failed to get store: %w", err)
  160. }
  161. result, err := w.getWebhookData(ctx, provider, ref)
  162. if err != nil {
  163. return nil, err
  164. }
  165. // We always want json here, so just parse it out
  166. jsondata := interface{}(nil)
  167. if err := yaml.Unmarshal(result, &jsondata); err != nil {
  168. return nil, fmt.Errorf("failed to parse response json: %w", err)
  169. }
  170. // Get subdata via jsonpath, if given
  171. if provider.Result.JSONPath != "" {
  172. jsondata, err = jsonpath.Get(provider.Result.JSONPath, jsondata)
  173. if err != nil {
  174. return nil, fmt.Errorf("failed to get response path %s: %w", provider.Result.JSONPath, err)
  175. }
  176. }
  177. // If the value is a string, try to parse it as json
  178. jsonstring, ok := jsondata.(string)
  179. if ok {
  180. // This could also happen if the response was a single json-encoded string
  181. // but that is an extremely unlikely scenario
  182. if err := yaml.Unmarshal([]byte(jsonstring), &jsondata); err != nil {
  183. return nil, fmt.Errorf("failed to parse response json from jsonpath: %w", err)
  184. }
  185. }
  186. // Use the data as a key-value map
  187. jsonvalue, ok := jsondata.(map[string]interface{})
  188. if !ok {
  189. return nil, fmt.Errorf("failed to get response (wrong type: %T)", jsondata)
  190. }
  191. // Change the map of generic objects to a map of byte arrays
  192. values := make(map[string][]byte)
  193. for rKey, rValue := range jsonvalue {
  194. jVal, ok := rValue.(string)
  195. if !ok {
  196. return nil, fmt.Errorf("failed to get response (wrong type in key '%s': %T)", rKey, rValue)
  197. }
  198. values[rKey] = []byte(jVal)
  199. }
  200. return values, nil
  201. }
  202. func (w *WebHook) getTemplateData(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef, secrets []esv1beta1.WebhookSecret) (map[string]map[string]string, error) {
  203. data := map[string]map[string]string{
  204. "remoteRef": {
  205. "key": url.QueryEscape(ref.Key),
  206. "version": url.QueryEscape(ref.Version),
  207. "property": url.QueryEscape(ref.Property),
  208. },
  209. }
  210. for _, secref := range secrets {
  211. if _, ok := data[secref.Name]; !ok {
  212. data[secref.Name] = make(map[string]string)
  213. }
  214. secret, err := w.getStoreSecret(ctx, secref.SecretRef)
  215. if err != nil {
  216. return nil, err
  217. }
  218. for sKey, sVal := range secret.Data {
  219. data[secref.Name][sKey] = string(sVal)
  220. }
  221. }
  222. return data, nil
  223. }
  224. func (w *WebHook) getWebhookData(ctx context.Context, provider *esv1beta1.WebhookProvider, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  225. if w.http == nil {
  226. return nil, fmt.Errorf("http client not initialized")
  227. }
  228. data, err := w.getTemplateData(ctx, ref, provider.Secrets)
  229. if err != nil {
  230. return nil, err
  231. }
  232. method := provider.Method
  233. if method == "" {
  234. method = http.MethodGet
  235. }
  236. url, err := executeTemplateString(provider.URL, data)
  237. if err != nil {
  238. return nil, fmt.Errorf("failed to parse url: %w", err)
  239. }
  240. body, err := executeTemplate(provider.Body, data)
  241. if err != nil {
  242. return nil, fmt.Errorf("failed to parse body: %w", err)
  243. }
  244. req, err := http.NewRequestWithContext(ctx, method, url, &body)
  245. if err != nil {
  246. return nil, fmt.Errorf("failed to create request: %w", err)
  247. }
  248. for hKey, hValueTpl := range provider.Headers {
  249. hValue, err := executeTemplateString(hValueTpl, data)
  250. if err != nil {
  251. return nil, fmt.Errorf("failed to parse header %s: %w", hKey, err)
  252. }
  253. req.Header.Add(hKey, hValue)
  254. }
  255. resp, err := w.http.Do(req)
  256. metrics.ObserveAPICall(metrics.ProviderWebhook, metrics.CallWebhookHTTPReq, err)
  257. if err != nil {
  258. return nil, fmt.Errorf("failed to call endpoint: %w", err)
  259. }
  260. defer resp.Body.Close()
  261. if resp.StatusCode == 404 {
  262. return nil, esv1beta1.NoSecretError{}
  263. }
  264. if resp.StatusCode < 200 || resp.StatusCode >= 300 {
  265. return nil, fmt.Errorf("endpoint gave error %s", resp.Status)
  266. }
  267. return io.ReadAll(resp.Body)
  268. }
  269. func (w *WebHook) getHTTPClient(provider *esv1beta1.WebhookProvider) (*http.Client, error) {
  270. client := &http.Client{}
  271. if provider.Timeout != nil {
  272. client.Timeout = provider.Timeout.Duration
  273. }
  274. if len(provider.CABundle) == 0 && provider.CAProvider == nil {
  275. // No need to process ca stuff if it is not there
  276. return client, nil
  277. }
  278. caCertPool, err := w.getCACertPool(provider)
  279. if err != nil {
  280. return nil, err
  281. }
  282. tlsConf := &tls.Config{
  283. RootCAs: caCertPool,
  284. MinVersion: tls.VersionTLS12,
  285. }
  286. client.Transport = &http.Transport{TLSClientConfig: tlsConf}
  287. return client, nil
  288. }
  289. func (w *WebHook) getCACertPool(provider *esv1beta1.WebhookProvider) (*x509.CertPool, error) {
  290. caCertPool := x509.NewCertPool()
  291. if len(provider.CABundle) > 0 {
  292. ok := caCertPool.AppendCertsFromPEM(provider.CABundle)
  293. if !ok {
  294. return nil, fmt.Errorf("failed to append cabundle")
  295. }
  296. }
  297. if provider.CAProvider != nil && w.storeKind == esv1beta1.ClusterSecretStoreKind && provider.CAProvider.Namespace == nil {
  298. return nil, fmt.Errorf("missing namespace on CAProvider secret")
  299. }
  300. if provider.CAProvider != nil {
  301. var cert []byte
  302. var err error
  303. switch provider.CAProvider.Type {
  304. case esv1beta1.WebhookCAProviderTypeSecret:
  305. cert, err = w.getCertFromSecret(provider)
  306. case esv1beta1.WebhookCAProviderTypeConfigMap:
  307. cert, err = w.getCertFromConfigMap(provider)
  308. default:
  309. err = fmt.Errorf("unknown caprovider type: %s", provider.CAProvider.Type)
  310. }
  311. if err != nil {
  312. return nil, err
  313. }
  314. ok := caCertPool.AppendCertsFromPEM(cert)
  315. if !ok {
  316. return nil, fmt.Errorf("failed to append cabundle")
  317. }
  318. }
  319. return caCertPool, nil
  320. }
  321. func (w *WebHook) getCertFromSecret(provider *esv1beta1.WebhookProvider) ([]byte, error) {
  322. secretRef := esmeta.SecretKeySelector{
  323. Name: provider.CAProvider.Name,
  324. Key: provider.CAProvider.Key,
  325. }
  326. if provider.CAProvider.Namespace != nil {
  327. secretRef.Namespace = provider.CAProvider.Namespace
  328. }
  329. ctx := context.Background()
  330. res, err := w.secretKeyRef(ctx, &secretRef)
  331. if err != nil {
  332. return nil, err
  333. }
  334. return []byte(res), nil
  335. }
  336. func (w *WebHook) secretKeyRef(ctx context.Context, secretRef *esmeta.SecretKeySelector) (string, error) {
  337. secret := &corev1.Secret{}
  338. ref := client.ObjectKey{
  339. Namespace: w.namespace,
  340. Name: secretRef.Name,
  341. }
  342. if (w.storeKind == esv1beta1.ClusterSecretStoreKind) &&
  343. (secretRef.Namespace != nil) {
  344. ref.Namespace = *secretRef.Namespace
  345. }
  346. err := w.kube.Get(ctx, ref, secret)
  347. if err != nil {
  348. return "", err
  349. }
  350. keyBytes, ok := secret.Data[secretRef.Key]
  351. if !ok {
  352. return "", err
  353. }
  354. value := string(keyBytes)
  355. valueStr := strings.TrimSpace(value)
  356. return valueStr, nil
  357. }
  358. func (w *WebHook) getCertFromConfigMap(provider *esv1beta1.WebhookProvider) ([]byte, error) {
  359. objKey := client.ObjectKey{
  360. Name: provider.CAProvider.Name,
  361. }
  362. if provider.CAProvider.Namespace != nil {
  363. objKey.Namespace = *provider.CAProvider.Namespace
  364. }
  365. configMapRef := &corev1.ConfigMap{}
  366. ctx := context.Background()
  367. err := w.kube.Get(ctx, objKey, configMapRef)
  368. if err != nil {
  369. return nil, fmt.Errorf("failed to get caprovider secret %s: %w", objKey.Name, err)
  370. }
  371. val, ok := configMapRef.Data[provider.CAProvider.Key]
  372. if !ok {
  373. return nil, fmt.Errorf("failed to get caprovider configmap %s -> %s", objKey.Name, provider.CAProvider.Key)
  374. }
  375. return []byte(val), nil
  376. }
  377. func (w *WebHook) Close(ctx context.Context) error {
  378. return nil
  379. }
  380. func (w *WebHook) Validate() (esv1beta1.ValidationResult, error) {
  381. timeout := 15 * time.Second
  382. url := w.url
  383. if err := utils.NetworkValidate(url, timeout); err != nil {
  384. return esv1beta1.ValidationResultError, err
  385. }
  386. return esv1beta1.ValidationResultReady, nil
  387. }
  388. func executeTemplateString(tmpl string, data map[string]map[string]string) (string, error) {
  389. result, err := executeTemplate(tmpl, data)
  390. if err != nil {
  391. return "", err
  392. }
  393. return result.String(), nil
  394. }
  395. func executeTemplate(tmpl string, data map[string]map[string]string) (bytes.Buffer, error) {
  396. var result bytes.Buffer
  397. if tmpl == "" {
  398. return result, nil
  399. }
  400. urlt, err := tpl.New("webhooktemplate").Funcs(template.FuncMap()).Parse(tmpl)
  401. if err != nil {
  402. return result, err
  403. }
  404. if err := urlt.Execute(&result, data); err != nil {
  405. return result, err
  406. }
  407. return result, nil
  408. }