fake.go 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "fmt"
  16. "github.com/tidwall/gjson"
  17. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  18. "sigs.k8s.io/controller-runtime/pkg/client"
  19. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  20. )
  21. var (
  22. errMissingStore = fmt.Errorf("missing store provider")
  23. errMissingFakeProvider = fmt.Errorf("missing store provider fake")
  24. errMissingKeyField = "key must be set in data %v"
  25. errMissingValueField = "at least one of value or valueMap must be set in data %v"
  26. )
  27. type SourceOrigin string
  28. const (
  29. FakeSecretStore SourceOrigin = "SecretStore"
  30. FakeSetSecret SourceOrigin = "SetSecret"
  31. )
  32. type Data struct {
  33. Value string
  34. Version string
  35. ValueMap map[string]string
  36. Origin SourceOrigin
  37. }
  38. type Config map[string]*Data
  39. type Provider struct {
  40. config Config
  41. database map[string]Config
  42. }
  43. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  44. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  45. return esv1beta1.SecretStoreReadWrite
  46. }
  47. func (p *Provider) NewClient(_ context.Context, store esv1beta1.GenericStore, _ client.Client, _ string) (esv1beta1.SecretsClient, error) {
  48. if p.database == nil {
  49. p.database = make(map[string]Config)
  50. }
  51. c, err := getProvider(store)
  52. if err != nil {
  53. return nil, err
  54. }
  55. cfg := p.database[store.GetName()]
  56. if cfg == nil {
  57. cfg = Config{}
  58. }
  59. // We want to remove any FakeSecretStore entry from memory
  60. // this will ensure SecretStores can delete from memory.
  61. for key, data := range cfg {
  62. if data.Origin == FakeSecretStore {
  63. delete(cfg, key)
  64. }
  65. }
  66. for _, data := range c.Data {
  67. mapKey := fmt.Sprintf("%v%v", data.Key, data.Version)
  68. cfg[mapKey] = &Data{
  69. Value: data.Value,
  70. Version: data.Version,
  71. Origin: FakeSecretStore,
  72. }
  73. if data.ValueMap != nil {
  74. cfg[mapKey].ValueMap = data.ValueMap
  75. }
  76. }
  77. p.database[store.GetName()] = cfg
  78. return &Provider{
  79. config: cfg,
  80. }, nil
  81. }
  82. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.FakeProvider, error) {
  83. if store == nil {
  84. return nil, errMissingStore
  85. }
  86. spc := store.GetSpec()
  87. if spc == nil || spc.Provider == nil || spc.Provider.Fake == nil {
  88. return nil, errMissingFakeProvider
  89. }
  90. return spc.Provider.Fake, nil
  91. }
  92. func (p *Provider) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
  93. return nil
  94. }
  95. func (p *Provider) PushSecret(_ context.Context, value []byte, _ *apiextensionsv1.JSON, remoteRef esv1beta1.PushRemoteRef) error {
  96. currentData, ok := p.config[remoteRef.GetRemoteKey()]
  97. if !ok {
  98. p.config[remoteRef.GetRemoteKey()] = &Data{
  99. Value: string(value),
  100. Origin: FakeSetSecret,
  101. }
  102. return nil
  103. }
  104. if currentData.Origin != FakeSetSecret {
  105. return fmt.Errorf("key already exists")
  106. }
  107. currentData.Value = string(value)
  108. return nil
  109. }
  110. // Empty GetAllSecrets.
  111. func (p *Provider) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  112. // TO be implemented
  113. return nil, fmt.Errorf("GetAllSecrets not implemented")
  114. }
  115. // GetSecret returns a single secret from the provider.
  116. func (p *Provider) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  117. mapKey := fmt.Sprintf("%v%v", ref.Key, ref.Version)
  118. data, ok := p.config[mapKey]
  119. if !ok || data.Version != ref.Version {
  120. return nil, esv1beta1.NoSecretErr
  121. }
  122. if ref.Property != "" {
  123. val := gjson.Get(data.Value, ref.Property)
  124. if !val.Exists() {
  125. return nil, esv1beta1.NoSecretErr
  126. }
  127. return []byte(val.String()), nil
  128. }
  129. return []byte(data.Value), nil
  130. }
  131. // GetSecretMap returns multiple k/v pairs from the provider.
  132. func (p *Provider) GetSecretMap(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  133. mapKey := fmt.Sprintf("%v%v", ref.Key, ref.Version)
  134. data, ok := p.config[mapKey]
  135. if !ok || data.Version != ref.Version || data.ValueMap == nil {
  136. return nil, esv1beta1.NoSecretErr
  137. }
  138. return convertMap(data.ValueMap), nil
  139. }
  140. func convertMap(in map[string]string) map[string][]byte {
  141. m := make(map[string][]byte)
  142. for k, v := range in {
  143. m[k] = []byte(v)
  144. }
  145. return m
  146. }
  147. func (p *Provider) Close(_ context.Context) error {
  148. return nil
  149. }
  150. func (p *Provider) Validate() (esv1beta1.ValidationResult, error) {
  151. return esv1beta1.ValidationResultReady, nil
  152. }
  153. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  154. prov := store.GetSpec().Provider.Fake
  155. if prov == nil {
  156. return nil
  157. }
  158. for pos, data := range prov.Data {
  159. if data.Key == "" {
  160. return fmt.Errorf(errMissingKeyField, pos)
  161. }
  162. if data.Value == "" && data.ValueMap == nil {
  163. return fmt.Errorf(errMissingValueField, pos)
  164. }
  165. }
  166. return nil
  167. }
  168. func init() {
  169. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  170. Fake: &esv1beta1.FakeProvider{},
  171. })
  172. }