fake.go 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "strings"
  19. "github.com/tidwall/gjson"
  20. corev1 "k8s.io/api/core/v1"
  21. "sigs.k8s.io/controller-runtime/pkg/client"
  22. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  23. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  24. "github.com/external-secrets/external-secrets/pkg/find"
  25. "github.com/external-secrets/external-secrets/pkg/utils"
  26. )
  27. var (
  28. errMissingStore = errors.New("missing store provider")
  29. errMissingFakeProvider = errors.New("missing store provider fake")
  30. errMissingKeyField = "key must be set in data %v"
  31. errMissingValueField = "at least one value must be set in data %v"
  32. )
  33. type SourceOrigin string
  34. const (
  35. FakeSecretStore SourceOrigin = "SecretStore"
  36. FakeSetSecret SourceOrigin = "SetSecret"
  37. )
  38. type Data struct {
  39. Value string
  40. Version string
  41. Origin SourceOrigin
  42. }
  43. type Config map[string]*Data
  44. type Provider struct {
  45. config Config
  46. database map[string]Config
  47. validationResult *esv1.ValidationResult
  48. }
  49. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  50. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  51. return esv1.SecretStoreReadWrite
  52. }
  53. func (p *Provider) NewClient(_ context.Context, store esv1.GenericStore, _ client.Client, _ string) (esv1.SecretsClient, error) {
  54. if p.database == nil {
  55. p.database = make(map[string]Config)
  56. }
  57. c, err := getProvider(store)
  58. if err != nil {
  59. return nil, err
  60. }
  61. cfg := p.database[store.GetName()]
  62. if cfg == nil {
  63. cfg = Config{}
  64. }
  65. // We want to remove any FakeSecretStore entry from memory
  66. // this will ensure SecretStores can delete from memory.
  67. for key, data := range cfg {
  68. if data.Origin == FakeSecretStore {
  69. delete(cfg, key)
  70. }
  71. }
  72. for _, data := range c.Data {
  73. key := mapKey(data.Key, data.Version)
  74. cfg[key] = &Data{
  75. Value: data.Value,
  76. Version: data.Version,
  77. Origin: FakeSecretStore,
  78. }
  79. }
  80. p.database[store.GetName()] = cfg
  81. return &Provider{
  82. config: cfg,
  83. validationResult: c.ValidationResult,
  84. }, nil
  85. }
  86. func getProvider(store esv1.GenericStore) (*esv1.FakeProvider, error) {
  87. if store == nil {
  88. return nil, errMissingStore
  89. }
  90. spc := store.GetSpec()
  91. if spc == nil || spc.Provider == nil || spc.Provider.Fake == nil {
  92. return nil, errMissingFakeProvider
  93. }
  94. return spc.Provider.Fake, nil
  95. }
  96. func (p *Provider) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  97. return nil
  98. }
  99. func (p *Provider) SecretExists(_ context.Context, ref esv1.PushSecretRemoteRef) (bool, error) {
  100. _, ok := p.config[ref.GetRemoteKey()]
  101. return ok, nil
  102. }
  103. func (p *Provider) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  104. value := secret.Data[data.GetSecretKey()]
  105. currentData, ok := p.config[data.GetRemoteKey()]
  106. if !ok {
  107. p.config[data.GetRemoteKey()] = &Data{
  108. Value: string(value),
  109. Origin: FakeSetSecret,
  110. }
  111. return nil
  112. }
  113. if currentData.Origin != FakeSetSecret {
  114. return errors.New("key already exists")
  115. }
  116. currentData.Value = string(value)
  117. return nil
  118. }
  119. // GetAllSecrets returns multiple secrets from the given ExternalSecretFind
  120. // Currently, only the Name operator is supported.
  121. func (p *Provider) GetAllSecrets(_ context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  122. if ref.Name != nil {
  123. matcher, err := find.New(*ref.Name)
  124. if err != nil {
  125. return nil, err
  126. }
  127. latestVersionMap := make(map[string]string)
  128. dataMap := make(map[string][]byte)
  129. for key, data := range p.config {
  130. // Reconstruct the original key without the version suffix
  131. // See the mapKey function to know how the provider generates keys
  132. originalKey := strings.TrimSuffix(key, data.Version)
  133. if !matcher.MatchName(originalKey) {
  134. continue
  135. }
  136. if version, ok := latestVersionMap[originalKey]; ok {
  137. // Need to get only the latest version
  138. if version < data.Version {
  139. latestVersionMap[originalKey] = data.Version
  140. dataMap[originalKey] = []byte(data.Value)
  141. }
  142. } else {
  143. latestVersionMap[originalKey] = data.Version
  144. dataMap[originalKey] = []byte(data.Value)
  145. }
  146. }
  147. return utils.ConvertKeys(ref.ConversionStrategy, dataMap)
  148. }
  149. return nil, fmt.Errorf("unsupported find operator: %#v", ref)
  150. }
  151. // GetSecret returns a single secret from the provider.
  152. func (p *Provider) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  153. data, ok := p.config[mapKey(ref.Key, ref.Version)]
  154. if !ok || data.Version != ref.Version {
  155. return nil, esv1.NoSecretErr
  156. }
  157. if ref.Property != "" {
  158. val := gjson.Get(data.Value, ref.Property)
  159. if !val.Exists() {
  160. return nil, esv1.NoSecretErr
  161. }
  162. return []byte(val.String()), nil
  163. }
  164. return []byte(data.Value), nil
  165. }
  166. // GetSecretMap returns multiple k/v pairs from the provider.
  167. func (p *Provider) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  168. ddata, ok := p.config[mapKey(ref.Key, ref.Version)]
  169. if !ok || ddata.Version != ref.Version {
  170. return nil, esv1.NoSecretErr
  171. }
  172. data, err := p.GetSecret(ctx, ref)
  173. if err != nil {
  174. return nil, err
  175. }
  176. secretData := make(map[string][]byte)
  177. kv := make(map[string]json.RawMessage)
  178. err = json.Unmarshal(data, &kv)
  179. if err != nil {
  180. return nil, fmt.Errorf("unable to unmarshal secret: %w", err)
  181. }
  182. for k, v := range kv {
  183. var strVal string
  184. err = json.Unmarshal(v, &strVal)
  185. if err == nil {
  186. secretData[k] = []byte(strVal)
  187. } else {
  188. secretData[k] = v
  189. }
  190. }
  191. return secretData, nil
  192. }
  193. func (p *Provider) Close(_ context.Context) error {
  194. return nil
  195. }
  196. func (p *Provider) Validate() (esv1.ValidationResult, error) {
  197. if p.validationResult != nil && *p.validationResult != esv1.ValidationResultReady {
  198. return *p.validationResult, errors.New("unable to validate")
  199. }
  200. return esv1.ValidationResultReady, nil
  201. }
  202. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  203. prov := store.GetSpec().Provider.Fake
  204. if prov == nil {
  205. return nil, nil
  206. }
  207. for pos, data := range prov.Data {
  208. if data.Key == "" {
  209. return nil, fmt.Errorf(errMissingKeyField, pos)
  210. }
  211. if data.Value == "" {
  212. return nil, fmt.Errorf(errMissingValueField, pos)
  213. }
  214. }
  215. return nil, nil
  216. }
  217. func mapKey(key, version string) string {
  218. // Add the version suffix to preserve entries with the old versions as well.
  219. return fmt.Sprintf("%v%v", key, version)
  220. }
  221. func init() {
  222. esv1.Register(&Provider{}, &esv1.SecretStoreProvider{
  223. Fake: &esv1.FakeProvider{},
  224. }, esv1.MaintenanceStatusNotMaintained) // TODO - update this post tests
  225. }