template.go 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package template
  13. import (
  14. "bytes"
  15. "crypto/x509"
  16. "encoding/base64"
  17. "encoding/json"
  18. "encoding/pem"
  19. "fmt"
  20. "strings"
  21. tpl "text/template"
  22. "github.com/lestrrat-go/jwx/v2/jwk"
  23. "github.com/youmark/pkcs8"
  24. corev1 "k8s.io/api/core/v1"
  25. "software.sslmate.com/src/go-pkcs12"
  26. esapi "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. )
  28. var tplFuncs = tpl.FuncMap{
  29. "pkcs12key": pkcs12key,
  30. "pkcs12keyPass": pkcs12keyPass,
  31. "pkcs12cert": pkcs12cert,
  32. "pkcs12certPass": pkcs12certPass,
  33. "pemPrivateKey": pemPrivateKey,
  34. "pemCertificate": pemCertificate,
  35. "base64decode": base64decode,
  36. "base64encode": base64encode,
  37. "fromJSON": fromJSON,
  38. "toJSON": toJSON,
  39. "jwkPublicKeyPem": jwkPublicKeyPem,
  40. "jwkPrivateKeyPem": jwkPrivateKeyPem,
  41. "toString": toString,
  42. "toBytes": toBytes,
  43. "upper": strings.ToUpper,
  44. "lower": strings.ToLower,
  45. }
  46. // So other templating calls can use the same extra functions.
  47. func FuncMap() tpl.FuncMap {
  48. return tplFuncs
  49. }
  50. const (
  51. errParse = "unable to parse template at key %s: %s"
  52. errExecute = "unable to execute template at key %s: %s"
  53. errDecodePKCS12WithPass = "unable to decode pkcs12 with password: %s"
  54. errConvertPrivKey = "unable to convert pkcs12 private key: %s"
  55. errDecodeCertWithPass = "unable to decode pkcs12 certificate with password: %s"
  56. errEncodePEMKey = "unable to encode pem private key: %s"
  57. errEncodePEMCert = "unable to encode pem certificate: %s"
  58. errDecodeBase64 = "unable to decode base64: %s"
  59. errUnmarshalJSON = "unable to unmarshal json: %s"
  60. errMarshalJSON = "unable to marshal json: %s"
  61. )
  62. // Execute renders the secret data as template. If an error occurs processing is stopped immediately.
  63. func Execute(tpl, data map[string][]byte, scope esapi.TemplateScope, target esapi.TemplateTarget, secret *corev1.Secret) error {
  64. if len(tpl) == 0 {
  65. return nil
  66. }
  67. if scope != "" && scope != esapi.TemplateScopeValues {
  68. return fmt.Errorf("template scope %s is not supported in v1 templates, please only use Values", scope)
  69. }
  70. switch target {
  71. case esapi.TemplateTargetAnnotations:
  72. // Annotations are not supported in v1 templates
  73. case esapi.TemplateTargetLabels:
  74. // Labels are not supported in v1 templates
  75. case esapi.TemplateTargetData, "":
  76. for k, v := range tpl {
  77. val, err := execute(k, string(v), data)
  78. if err != nil {
  79. return fmt.Errorf(errExecute, k, err)
  80. }
  81. secret.Data[k] = val
  82. }
  83. }
  84. return nil
  85. }
  86. func execute(k, val string, data map[string][]byte) ([]byte, error) {
  87. t, err := tpl.New(k).
  88. Option("missingkey=error").
  89. Funcs(tplFuncs).
  90. Parse(val)
  91. if err != nil {
  92. return nil, fmt.Errorf(errParse, k, err)
  93. }
  94. buf := bytes.NewBuffer(nil)
  95. err = t.Execute(buf, data)
  96. if err != nil {
  97. return nil, fmt.Errorf(errExecute, k, err)
  98. }
  99. return buf.Bytes(), nil
  100. }
  101. func pkcs12keyPass(pass string, input []byte) ([]byte, error) {
  102. key, _, err := pkcs12.Decode(input, pass)
  103. if err != nil {
  104. return nil, fmt.Errorf(errDecodePKCS12WithPass, err)
  105. }
  106. kb, err := pkcs8.ConvertPrivateKeyToPKCS8(key)
  107. if err != nil {
  108. return nil, fmt.Errorf(errConvertPrivKey, err)
  109. }
  110. return kb, nil
  111. }
  112. func pkcs12key(input []byte) ([]byte, error) {
  113. return pkcs12keyPass("", input)
  114. }
  115. func pkcs12certPass(pass string, input []byte) ([]byte, error) {
  116. _, cert, err := pkcs12.Decode(input, pass)
  117. if err != nil {
  118. return nil, fmt.Errorf(errDecodeCertWithPass, err)
  119. }
  120. return cert.Raw, nil
  121. }
  122. func pkcs12cert(input []byte) ([]byte, error) {
  123. return pkcs12certPass("", input)
  124. }
  125. func jwkPublicKeyPem(jwkjson []byte) (string, error) {
  126. k, err := jwk.ParseKey(jwkjson)
  127. if err != nil {
  128. return "", err
  129. }
  130. var rawkey any
  131. err = k.Raw(&rawkey)
  132. if err != nil {
  133. return "", err
  134. }
  135. mpk, err := x509.MarshalPKIXPublicKey(rawkey)
  136. if err != nil {
  137. return "", err
  138. }
  139. return pemEncode(mpk, "PUBLIC KEY")
  140. }
  141. func jwkPrivateKeyPem(jwkjson []byte) (string, error) {
  142. k, err := jwk.ParseKey(jwkjson)
  143. if err != nil {
  144. return "", err
  145. }
  146. var mpk []byte
  147. var pk any
  148. err = k.Raw(&pk)
  149. if err != nil {
  150. return "", err
  151. }
  152. mpk, err = x509.MarshalPKCS8PrivateKey(pk)
  153. if err != nil {
  154. return "", err
  155. }
  156. return pemEncode(mpk, "PRIVATE KEY")
  157. }
  158. func pemEncode(thing []byte, kind string) (string, error) {
  159. buf := bytes.NewBuffer(nil)
  160. err := pem.Encode(buf, &pem.Block{Type: kind, Bytes: thing})
  161. return buf.String(), err
  162. }
  163. func pemPrivateKey(key []byte) (string, error) {
  164. res, err := pemEncode(key, "PRIVATE KEY")
  165. if err != nil {
  166. return res, fmt.Errorf(errEncodePEMKey, err)
  167. }
  168. return res, nil
  169. }
  170. func pemCertificate(cert []byte) (string, error) {
  171. res, err := pemEncode(cert, "CERTIFICATE")
  172. if err != nil {
  173. return res, fmt.Errorf(errEncodePEMCert, err)
  174. }
  175. return res, nil
  176. }
  177. func base64decode(in []byte) ([]byte, error) {
  178. out := make([]byte, len(in))
  179. l, err := base64.StdEncoding.Decode(out, in)
  180. if err != nil {
  181. return nil, fmt.Errorf(errDecodeBase64, err)
  182. }
  183. return out[:l], nil
  184. }
  185. func base64encode(in []byte) []byte {
  186. out := make([]byte, base64.StdEncoding.EncodedLen(len(in)))
  187. base64.StdEncoding.Encode(out, in)
  188. return out
  189. }
  190. func fromJSON(in []byte) (any, error) {
  191. var out any
  192. err := json.Unmarshal(in, &out)
  193. if err != nil {
  194. return nil, fmt.Errorf(errUnmarshalJSON, err)
  195. }
  196. return out, nil
  197. }
  198. func toJSON(in any) (string, error) {
  199. output, err := json.Marshal(in)
  200. if err != nil {
  201. return "", fmt.Errorf(errMarshalJSON, err)
  202. }
  203. return string(output), nil
  204. }
  205. func toString(in []byte) string {
  206. return string(in)
  207. }
  208. func toBytes(in string) []byte {
  209. return []byte(in)
  210. }