client.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package kubernetes
  14. import (
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "strings"
  21. "github.com/tidwall/gjson"
  22. v1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/api/equality"
  24. apierrors "k8s.io/apimachinery/pkg/api/errors"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/labels"
  27. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  28. "github.com/external-secrets/external-secrets/runtime/constants"
  29. "github.com/external-secrets/external-secrets/runtime/esutils"
  30. "github.com/external-secrets/external-secrets/runtime/esutils/metadata"
  31. "github.com/external-secrets/external-secrets/runtime/find"
  32. "github.com/external-secrets/external-secrets/runtime/metrics"
  33. )
  34. const (
  35. metaLabels = "labels"
  36. metaAnnotations = "annotations"
  37. )
  38. // GetSecret retrieves a secret from the Kubernetes API server by its key.
  39. func (c *Client) GetSecret(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  40. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  41. if err != nil {
  42. return nil, err
  43. }
  44. // if property is not defined, we will return the json-serialized secret
  45. if ref.Property == "" {
  46. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  47. m := map[string]map[string]string{}
  48. m[metaLabels] = secret.Labels
  49. m[metaAnnotations] = secret.Annotations
  50. j, err := esutils.JSONMarshal(m)
  51. if err != nil {
  52. return nil, err
  53. }
  54. return j, nil
  55. }
  56. m := map[string]string{}
  57. for key, val := range secret.Data {
  58. m[key] = string(val)
  59. }
  60. j, err := esutils.JSONMarshal(m)
  61. if err != nil {
  62. return nil, err
  63. }
  64. return j, nil
  65. }
  66. return getSecret(secret, ref)
  67. }
  68. // DeleteSecret removes a secret value from Kubernetes.
  69. // It requires a property to be specified in the RemoteRef.
  70. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1.PushSecretRemoteRef) error {
  71. extSecret, getErr := c.userSecretClient.Get(ctx, remoteRef.GetRemoteKey(), metav1.GetOptions{})
  72. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  73. if getErr != nil {
  74. if apierrors.IsNotFound(getErr) {
  75. // return gracefully if no secret exists
  76. return nil
  77. }
  78. return getErr
  79. }
  80. if remoteRef.GetProperty() != "" {
  81. if _, ok := extSecret.Data[remoteRef.GetProperty()]; !ok {
  82. // return gracefully if specified secret does not contain the given property
  83. return nil
  84. }
  85. if len(extSecret.Data) > 1 {
  86. return c.removeProperty(ctx, extSecret, remoteRef)
  87. }
  88. }
  89. return c.fullDelete(ctx, remoteRef.GetRemoteKey())
  90. }
  91. // SecretExists checks if a secret exists in Kubernetes.
  92. // This method is not implemented and always returns an error.
  93. func (c *Client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  94. return false, errors.New("not implemented")
  95. }
  96. // PushSecret creates or updates a secret in Kubernetes.
  97. func (c *Client) PushSecret(ctx context.Context, secret *v1.Secret, data esv1.PushSecretData) error {
  98. if data.GetProperty() == "" && data.GetSecretKey() != "" {
  99. return errors.New("requires property in RemoteRef to push secret value if secret key is defined")
  100. }
  101. remoteSecret := &v1.Secret{
  102. ObjectMeta: metav1.ObjectMeta{
  103. Namespace: c.store.RemoteNamespace,
  104. Name: data.GetRemoteKey(),
  105. },
  106. }
  107. return c.createOrUpdate(ctx, remoteSecret, func() error {
  108. return c.mergePushSecretData(data, remoteSecret, secret)
  109. })
  110. }
  111. func (c *Client) mergePushSecretData(remoteRef esv1.PushSecretData, remoteSecret, localSecret *v1.Secret) error {
  112. // apply secret type
  113. secretType := v1.SecretTypeOpaque
  114. if localSecret.Type != "" {
  115. secretType = localSecret.Type
  116. }
  117. remoteSecret.Type = secretType
  118. // merge secret data with existing secret data
  119. if remoteSecret.Data == nil {
  120. remoteSecret.Data = make(map[string][]byte)
  121. }
  122. pushMeta, err := metadata.ParseMetadataParameters[PushSecretMetadataSpec](remoteRef.GetMetadata())
  123. if err != nil {
  124. return fmt.Errorf("unable to parse metadata parameters: %w", err)
  125. }
  126. // merge metadata based on the policy
  127. var targetLabels, targetAnnotations map[string]string
  128. sourceLabels, sourceAnnotations, err := mergeSourceMetadata(localSecret, pushMeta)
  129. if err != nil {
  130. return fmt.Errorf("failed to merge source metadata: %w", err)
  131. }
  132. targetLabels, targetAnnotations, err = mergeTargetMetadata(remoteSecret, pushMeta, sourceLabels, sourceAnnotations)
  133. if err != nil {
  134. return fmt.Errorf("failed to merge target metadata: %w", err)
  135. }
  136. remoteSecret.ObjectMeta.Labels = targetLabels
  137. remoteSecret.ObjectMeta.Annotations = targetAnnotations
  138. if pushMeta != nil && pushMeta.Spec.RemoteNamespace != "" {
  139. remoteSecret.ObjectMeta.Namespace = pushMeta.Spec.RemoteNamespace
  140. }
  141. // case 1: push the whole secret
  142. if remoteRef.GetProperty() == "" {
  143. for k, v := range localSecret.Data {
  144. remoteSecret.Data[k] = v
  145. }
  146. return nil
  147. }
  148. // cases 2a + 2b: push into a property.
  149. // if secret key is empty, we will marshal the whole secret and put it into
  150. // the property defined in the remoteRef.
  151. if remoteRef.GetSecretKey() == "" {
  152. value, err := c.marshalData(localSecret)
  153. if err != nil {
  154. return err
  155. }
  156. remoteSecret.Data[remoteRef.GetProperty()] = value
  157. } else {
  158. // if secret key is defined, we will push that key from the local secret
  159. remoteSecret.Data[remoteRef.GetProperty()] = localSecret.Data[remoteRef.GetSecretKey()]
  160. }
  161. return nil
  162. }
  163. func (c *Client) createOrUpdate(ctx context.Context, targetSecret *v1.Secret, f func() error) error {
  164. target, err := c.userSecretClient.Get(ctx, targetSecret.Name, metav1.GetOptions{})
  165. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  166. if err != nil {
  167. if !apierrors.IsNotFound(err) {
  168. return err
  169. }
  170. if err := f(); err != nil {
  171. return err
  172. }
  173. _, err := c.userSecretClient.Create(ctx, targetSecret, metav1.CreateOptions{})
  174. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesCreateSecret, err)
  175. if err != nil {
  176. return err
  177. }
  178. return nil
  179. }
  180. *targetSecret = *target
  181. existing := targetSecret.DeepCopyObject()
  182. if err := f(); err != nil {
  183. return err
  184. }
  185. if equality.Semantic.DeepEqual(existing, targetSecret) {
  186. return nil
  187. }
  188. _, err = c.userSecretClient.Update(ctx, targetSecret, metav1.UpdateOptions{})
  189. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  190. if err != nil {
  191. return err
  192. }
  193. return nil
  194. }
  195. func (c *Client) marshalData(secret *v1.Secret) ([]byte, error) {
  196. values := make(map[string]string)
  197. for k, v := range secret.Data {
  198. values[k] = string(v)
  199. }
  200. // marshal
  201. value, err := esutils.JSONMarshal(values)
  202. if err != nil {
  203. return nil, fmt.Errorf("failed to marshal secrets into a single property: %w", err)
  204. }
  205. return value, nil
  206. }
  207. // GetSecretMap retrieves a secret from Kubernetes and returns it as a map.
  208. // The secret data is converted to a map of key/value pairs.
  209. func (c *Client) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  210. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  211. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  212. if apierrors.IsNotFound(err) {
  213. return nil, esv1.NoSecretError{}
  214. }
  215. if err != nil {
  216. return nil, err
  217. }
  218. var tmpMap map[string][]byte
  219. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  220. tmpMap, err = getSecretMetadata(secret)
  221. if err != nil {
  222. return nil, err
  223. }
  224. } else {
  225. tmpMap = secret.Data
  226. }
  227. if ref.Property != "" {
  228. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  229. if err != nil {
  230. return nil, err
  231. }
  232. return retMap, nil
  233. }
  234. return tmpMap, nil
  235. }
  236. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  237. byteArr, err := esutils.JSONMarshal(tmpMap)
  238. if err != nil {
  239. return nil, err
  240. }
  241. var retMap map[string][]byte
  242. jsonStr := string(byteArr)
  243. // We need to search if a given key with a . exists before using gjson operations.
  244. idx := strings.Index(property, ".")
  245. if idx > -1 {
  246. refProperty := strings.ReplaceAll(property, ".", "\\.")
  247. retMap, err = getMapFromValues(refProperty, jsonStr)
  248. if err != nil {
  249. return nil, err
  250. }
  251. if retMap != nil {
  252. return retMap, nil
  253. }
  254. }
  255. retMap, err = getMapFromValues(property, jsonStr)
  256. if err != nil {
  257. return nil, err
  258. }
  259. if retMap == nil {
  260. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  261. }
  262. return retMap, nil
  263. }
  264. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  265. val := gjson.Get(jsonStr, property)
  266. if val.Exists() {
  267. retMap := make(map[string][]byte)
  268. var tmpMap map[string]any
  269. decoded, err := base64.StdEncoding.DecodeString(val.String())
  270. if err != nil {
  271. return nil, err
  272. }
  273. err = json.Unmarshal(decoded, &tmpMap)
  274. if err != nil {
  275. // Do not return the raw error as json.Unmarshal errors may contain
  276. // sensitive secret data in the error message
  277. return nil, errors.New("failed to unmarshal secret: invalid JSON format")
  278. }
  279. for k, v := range tmpMap {
  280. b, err := esutils.JSONMarshal(v)
  281. if err != nil {
  282. return nil, err
  283. }
  284. retMap[k] = b
  285. }
  286. return retMap, nil
  287. }
  288. return nil, nil
  289. }
  290. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  291. var err error
  292. tmpMap := make(map[string][]byte)
  293. tmpMap[metaLabels], err = esutils.JSONMarshal(secret.ObjectMeta.Labels)
  294. if err != nil {
  295. return nil, err
  296. }
  297. tmpMap[metaAnnotations], err = esutils.JSONMarshal(secret.ObjectMeta.Annotations)
  298. if err != nil {
  299. return nil, err
  300. }
  301. return tmpMap, nil
  302. }
  303. // GetAllSecrets retrieves multiple secrets from Kubernetes based on the search criteria.
  304. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  305. if ref.Tags != nil {
  306. return c.findByTags(ctx, ref)
  307. }
  308. if ref.Name != nil {
  309. return c.findByName(ctx, ref)
  310. }
  311. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  312. }
  313. func (c *Client) findByTags(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  314. // empty/nil tags = everything
  315. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  316. if err != nil {
  317. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  318. }
  319. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  320. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  321. if err != nil {
  322. return nil, fmt.Errorf("unable to list secrets: %w", err)
  323. }
  324. data := make(map[string][]byte)
  325. for _, secret := range secrets.Items {
  326. jsonStr, err := esutils.JSONMarshal(convertMap(secret.Data))
  327. if err != nil {
  328. return nil, err
  329. }
  330. data[secret.Name] = jsonStr
  331. }
  332. return esutils.ConvertKeys(ref.ConversionStrategy, data)
  333. }
  334. func (c *Client) findByName(ctx context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  335. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  336. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  337. if err != nil {
  338. return nil, fmt.Errorf("unable to list secrets: %w", err)
  339. }
  340. matcher, err := find.New(*ref.Name)
  341. if err != nil {
  342. return nil, err
  343. }
  344. data := make(map[string][]byte)
  345. for _, secret := range secrets.Items {
  346. if !matcher.MatchName(secret.Name) {
  347. continue
  348. }
  349. jsonStr, err := esutils.JSONMarshal(convertMap(secret.Data))
  350. if err != nil {
  351. return nil, err
  352. }
  353. data[secret.Name] = jsonStr
  354. }
  355. return esutils.ConvertKeys(ref.ConversionStrategy, data)
  356. }
  357. // Close implements cleanup operations for the Kubernetes client.
  358. func (c *Client) Close(_ context.Context) error {
  359. return nil
  360. }
  361. func convertMap(in map[string][]byte) map[string]string {
  362. out := make(map[string]string)
  363. for k, v := range in {
  364. out[k] = string(v)
  365. }
  366. return out
  367. }
  368. // fullDelete removes remote secret completely.
  369. func (c *Client) fullDelete(ctx context.Context, secretName string) error {
  370. err := c.userSecretClient.Delete(ctx, secretName, metav1.DeleteOptions{})
  371. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesDeleteSecret, err)
  372. // gracefully return on not found
  373. if apierrors.IsNotFound(err) {
  374. return nil
  375. }
  376. return err
  377. }
  378. // removeProperty removes single data property from remote secret.
  379. func (c *Client) removeProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1.PushSecretRemoteRef) error {
  380. delete(extSecret.Data, remoteRef.GetProperty())
  381. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  382. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  383. return err
  384. }
  385. func getSecret(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  386. if ref.MetadataPolicy == esv1.ExternalSecretMetadataPolicyFetch {
  387. s, found, err := getFromSecretMetadata(secret, ref)
  388. if err != nil {
  389. return nil, err
  390. }
  391. if !found {
  392. return nil, fmt.Errorf("property %s does not exist in metadata of secret %q", ref.Property, ref.Key)
  393. }
  394. return s, nil
  395. }
  396. s, found := getFromSecretData(secret, ref)
  397. if !found {
  398. return nil, fmt.Errorf("property %s does not exist in data of secret %q", ref.Property, ref.Key)
  399. }
  400. return s, nil
  401. }
  402. func getFromSecretData(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, bool) {
  403. // Check if a property with "." exists first such as file.png
  404. v, ok := secret.Data[ref.Property]
  405. if ok {
  406. return v, true
  407. }
  408. idx := strings.Index(ref.Property, ".")
  409. if idx == -1 || idx == 0 || idx == len(ref.Property)-1 {
  410. return nil, false
  411. }
  412. v, ok = secret.Data[ref.Property[:idx]]
  413. if !ok {
  414. return nil, false
  415. }
  416. val := gjson.Get(string(v), ref.Property[idx+1:])
  417. if !val.Exists() {
  418. return nil, false
  419. }
  420. return []byte(val.String()), true
  421. }
  422. func getFromSecretMetadata(secret *v1.Secret, ref esv1.ExternalSecretDataRemoteRef) ([]byte, bool, error) {
  423. path := strings.Split(ref.Property, ".")
  424. var metadata map[string]string
  425. switch path[0] {
  426. case metaLabels:
  427. metadata = secret.Labels
  428. case metaAnnotations:
  429. metadata = secret.Annotations
  430. default:
  431. return nil, false, nil
  432. }
  433. if len(path) == 1 {
  434. j, err := esutils.JSONMarshal(metadata)
  435. if err != nil {
  436. return nil, false, err
  437. }
  438. return j, true, nil
  439. }
  440. v, ok := metadata[path[1]]
  441. if !ok {
  442. return nil, false, nil
  443. }
  444. if len(path) == 2 {
  445. return []byte(v), true, nil
  446. }
  447. val := gjson.Get(v, strings.Join(path[2:], ""))
  448. if !val.Exists() {
  449. return nil, false, nil
  450. }
  451. return []byte(val.String()), true, nil
  452. }