gitlab.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package gitlab
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "net/http"
  19. "sort"
  20. "strconv"
  21. "strings"
  22. "github.com/tidwall/gjson"
  23. gitlab "gitlab.com/gitlab-org/api/client-go"
  24. corev1 "k8s.io/api/core/v1"
  25. ctrl "sigs.k8s.io/controller-runtime"
  26. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  27. "github.com/external-secrets/external-secrets/pkg/constants"
  28. "github.com/external-secrets/external-secrets/pkg/find"
  29. "github.com/external-secrets/external-secrets/pkg/metrics"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  32. )
  33. const (
  34. errList = "could not verify whether the gitlabClient is valid: %w"
  35. errProjectAuth = "gitlabClient is not allowed to get secrets for project id [%s]"
  36. errGroupAuth = "gitlabClient is not allowed to get secrets for group id [%s]"
  37. errUninitializedGitlabProvider = "provider gitlab is not initialized"
  38. errNameNotDefined = "'find.name' is mandatory"
  39. errEnvironmentIsConstricted = "'find.tags' is constrained by 'environment_scope' of the store"
  40. errTagsOnlyEnvironmentSupported = "'find.tags' only supports 'environment_scope'"
  41. errPathNotImplemented = "'find.path' is not implemented in the GitLab provider"
  42. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  43. errNotImplemented = "not implemented"
  44. )
  45. // https://github.com/external-secrets/external-secrets/issues/644
  46. var _ esv1.SecretsClient = &gitlabBase{}
  47. var _ esv1.Provider = &Provider{}
  48. type ProjectsClient interface {
  49. ListProjectsGroups(pid any, opt *gitlab.ListProjectGroupOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.ProjectGroup, *gitlab.Response, error)
  50. }
  51. type ProjectVariablesClient interface {
  52. GetVariable(pid any, key string, opt *gitlab.GetProjectVariableOptions, options ...gitlab.RequestOptionFunc) (*gitlab.ProjectVariable, *gitlab.Response, error)
  53. ListVariables(pid any, opt *gitlab.ListProjectVariablesOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.ProjectVariable, *gitlab.Response, error)
  54. }
  55. type GroupVariablesClient interface {
  56. GetVariable(gid any, key string, opts *gitlab.GetGroupVariableOptions, options ...gitlab.RequestOptionFunc) (*gitlab.GroupVariable, *gitlab.Response, error)
  57. ListVariables(gid any, opt *gitlab.ListGroupVariablesOptions, options ...gitlab.RequestOptionFunc) ([]*gitlab.GroupVariable, *gitlab.Response, error)
  58. }
  59. type ProjectGroupPathSorter []*gitlab.ProjectGroup
  60. func (a ProjectGroupPathSorter) Len() int { return len(a) }
  61. func (a ProjectGroupPathSorter) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
  62. func (a ProjectGroupPathSorter) Less(i, j int) bool { return len(a[i].FullPath) < len(a[j].FullPath) }
  63. var log = ctrl.Log.WithName("provider").WithName("gitlab")
  64. // Set gitlabBase credentials to Access Token.
  65. func (g *gitlabBase) getAuth(ctx context.Context) (string, error) {
  66. return resolvers.SecretKeyRef(
  67. ctx,
  68. g.kube,
  69. g.storeKind,
  70. g.namespace,
  71. &g.store.Auth.SecretRef.AccessToken)
  72. }
  73. func (g *gitlabBase) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  74. return errors.New(errNotImplemented)
  75. }
  76. func (g *gitlabBase) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  77. return false, errors.New(errNotImplemented)
  78. }
  79. func (g *gitlabBase) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1.PushSecretData) error {
  80. return errors.New(errNotImplemented)
  81. }
  82. // GetAllSecrets syncs all gitlab project and group variables into a single Kubernetes Secret.
  83. func (g *gitlabBase) GetAllSecrets(_ context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  84. if utils.IsNil(g.projectVariablesClient) {
  85. return nil, errors.New(errUninitializedGitlabProvider)
  86. }
  87. var effectiveEnvironment = g.store.Environment
  88. if ref.Tags != nil {
  89. environment, err := ExtractTag(ref.Tags)
  90. if err != nil {
  91. return nil, err
  92. }
  93. if !isEmptyOrWildcard(effectiveEnvironment) && !isEmptyOrWildcard(environment) {
  94. return nil, errors.New(errEnvironmentIsConstricted)
  95. }
  96. effectiveEnvironment = environment
  97. }
  98. if ref.Path != nil {
  99. return nil, errors.New(errPathNotImplemented)
  100. }
  101. if ref.Name == nil {
  102. return nil, errors.New(errNameNotDefined)
  103. }
  104. var matcher *find.Matcher
  105. if ref.Name != nil {
  106. m, err := find.New(*ref.Name)
  107. if err != nil {
  108. return nil, err
  109. }
  110. matcher = m
  111. }
  112. err := g.ResolveGroupIds()
  113. if err != nil {
  114. return nil, err
  115. }
  116. secretData, err := g.fetchSecretData(effectiveEnvironment, matcher)
  117. if err != nil {
  118. return nil, err
  119. }
  120. // _Note_: fetchProjectVariables alters secret data map
  121. if err := g.fetchProjectVariables(effectiveEnvironment, matcher, secretData); err != nil {
  122. return nil, err
  123. }
  124. return secretData, nil
  125. }
  126. func (g *gitlabBase) fetchProjectVariables(effectiveEnvironment string, matcher *find.Matcher, secretData map[string][]byte) error {
  127. var popts = &gitlab.ListProjectVariablesOptions{PerPage: 100}
  128. for projectPage := 1; ; projectPage++ {
  129. popts.Page = projectPage
  130. projectData, response, err := g.projectVariablesClient.ListVariables(g.store.ProjectID, popts)
  131. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabProjectListVariables, err)
  132. if err != nil {
  133. return err
  134. }
  135. for _, data := range projectData {
  136. matching, key, isWildcard := matchesFilter(effectiveEnvironment, data.EnvironmentScope, data.Key, matcher)
  137. if !matching {
  138. continue
  139. }
  140. _, exists := secretData[key]
  141. if exists && isWildcard {
  142. continue
  143. }
  144. secretData[key] = []byte(data.Value)
  145. }
  146. if response.CurrentPage >= response.TotalPages {
  147. break
  148. }
  149. }
  150. return nil
  151. }
  152. func (g *gitlabBase) fetchSecretData(effectiveEnvironment string, matcher *find.Matcher) (map[string][]byte, error) {
  153. var gopts = &gitlab.ListGroupVariablesOptions{PerPage: 100}
  154. secretData := make(map[string][]byte)
  155. for _, groupID := range g.store.GroupIDs {
  156. if err := g.setVariablesForGroupID(effectiveEnvironment, matcher, gopts, groupID, secretData); err != nil {
  157. return nil, err
  158. }
  159. }
  160. return secretData, nil
  161. }
  162. func (g *gitlabBase) setVariablesForGroupID(
  163. effectiveEnvironment string,
  164. matcher *find.Matcher,
  165. gopts *gitlab.ListGroupVariablesOptions,
  166. groupID string,
  167. secretData map[string][]byte,
  168. ) error {
  169. for groupPage := 1; ; groupPage++ {
  170. gopts.Page = groupPage
  171. groupVars, response, err := g.groupVariablesClient.ListVariables(groupID, gopts)
  172. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupListVariables, err)
  173. if err != nil {
  174. return err
  175. }
  176. g.setGroupValues(effectiveEnvironment, matcher, groupVars, secretData)
  177. if response.CurrentPage >= response.TotalPages {
  178. break
  179. }
  180. }
  181. return nil
  182. }
  183. func (g *gitlabBase) setGroupValues(
  184. effectiveEnvironment string,
  185. matcher *find.Matcher,
  186. groupVars []*gitlab.GroupVariable,
  187. secretData map[string][]byte,
  188. ) {
  189. for _, data := range groupVars {
  190. matching, key, isWildcard := matchesFilter(effectiveEnvironment, data.EnvironmentScope, data.Key, matcher)
  191. if !matching && !isWildcard {
  192. continue
  193. }
  194. secretData[key] = []byte(data.Value)
  195. }
  196. }
  197. func ExtractTag(tags map[string]string) (string, error) {
  198. var environmentScope string
  199. for tag, value := range tags {
  200. if tag != "environment_scope" {
  201. return "", errors.New(errTagsOnlyEnvironmentSupported)
  202. }
  203. environmentScope = value
  204. }
  205. return environmentScope, nil
  206. }
  207. func (g *gitlabBase) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  208. if utils.IsNil(g.projectVariablesClient) || utils.IsNil(g.groupVariablesClient) {
  209. return nil, errors.New(errUninitializedGitlabProvider)
  210. }
  211. // Need to replace hyphens with underscores to work with GitLab API
  212. ref.Key = strings.ReplaceAll(ref.Key, "-", "_")
  213. // Retrieves a gitlab variable in the form
  214. // {
  215. // "key": "TEST_VARIABLE_1",
  216. // "variable_type": "env_var",
  217. // "value": "TEST_1",
  218. // "protected": false,
  219. // "masked": true,
  220. // "environment_scope": "*"
  221. // }
  222. var gopts *gitlab.GetGroupVariableOptions
  223. var vopts *gitlab.GetProjectVariableOptions
  224. if g.store.Environment != "" {
  225. gopts = &gitlab.GetGroupVariableOptions{Filter: &gitlab.VariableFilter{EnvironmentScope: g.store.Environment}}
  226. vopts = &gitlab.GetProjectVariableOptions{Filter: &gitlab.VariableFilter{EnvironmentScope: g.store.Environment}}
  227. }
  228. // _Note_: getVariables potentially alters vopts environment variable.
  229. data, resp, err := g.getVariables(ref, vopts)
  230. if err != nil && (resp == nil || resp.StatusCode != http.StatusNotFound) {
  231. return nil, err
  232. }
  233. err = g.ResolveGroupIds()
  234. if err != nil {
  235. return nil, err
  236. }
  237. var result []byte
  238. if resp.StatusCode < 300 {
  239. result, err = extractVariable(ref, data.Value)
  240. }
  241. for i := len(g.store.GroupIDs) - 1; i >= 0; i-- {
  242. groupID := g.store.GroupIDs[i]
  243. if result != nil {
  244. return result, nil
  245. }
  246. groupVar, resp, err := g.groupVariablesClient.GetVariable(groupID, ref.Key, gopts)
  247. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupGetVariable, err)
  248. if resp.StatusCode >= 400 && resp.StatusCode != http.StatusNotFound && err != nil {
  249. return nil, err
  250. }
  251. if resp.StatusCode < 300 {
  252. result, _ = extractVariable(ref, groupVar.Value)
  253. }
  254. }
  255. if result != nil {
  256. return result, nil
  257. }
  258. return nil, err
  259. }
  260. func extractVariable(ref esv1.ExternalSecretDataRemoteRef, value string) ([]byte, error) {
  261. if ref.Property == "" {
  262. if value != "" {
  263. return []byte(value), nil
  264. }
  265. return nil, fmt.Errorf("invalid secret received. no secret string for key: %s", ref.Key)
  266. }
  267. var payload string
  268. if value != "" {
  269. payload = value
  270. }
  271. val := gjson.Get(payload, ref.Property)
  272. if !val.Exists() {
  273. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  274. }
  275. return []byte(val.String()), nil
  276. }
  277. func (g *gitlabBase) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  278. // Gets a secret as normal, expecting secret value to be a json object
  279. data, err := g.GetSecret(ctx, ref)
  280. if err != nil {
  281. return nil, fmt.Errorf("error getting secret %s: %w", ref.Key, err)
  282. }
  283. // Maps the json data to a string:string map
  284. kv := make(map[string]string)
  285. err = json.Unmarshal(data, &kv)
  286. if err != nil {
  287. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  288. }
  289. // Converts values in K:V pairs into bytes, while leaving keys as strings
  290. secretData := make(map[string][]byte)
  291. for k, v := range kv {
  292. secretData[k] = []byte(v)
  293. }
  294. return secretData, nil
  295. }
  296. func isEmptyOrWildcard(environment string) bool {
  297. return environment == "" || environment == "*"
  298. }
  299. func matchesFilter(environment, varEnvironment, key string, matcher *find.Matcher) (bool, string, bool) {
  300. isWildcard := isEmptyOrWildcard(varEnvironment)
  301. if !isWildcard && !isEmptyOrWildcard(environment) {
  302. // as of now gitlab does not support filtering of EnvironmentScope through the api call
  303. if varEnvironment != environment {
  304. return false, "", isWildcard
  305. }
  306. }
  307. if key == "" || (matcher != nil && !matcher.MatchName(key)) {
  308. return false, "", isWildcard
  309. }
  310. return true, key, isWildcard
  311. }
  312. func (g *gitlabBase) Close(_ context.Context) error {
  313. return nil
  314. }
  315. func (g *gitlabBase) ResolveGroupIds() error {
  316. if g.store.InheritFromGroups {
  317. projectGroups, resp, err := g.projectsClient.ListProjectsGroups(g.store.ProjectID, nil)
  318. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabListProjectsGroups, err)
  319. if resp.StatusCode >= 400 && err != nil {
  320. return err
  321. }
  322. sort.Sort(ProjectGroupPathSorter(projectGroups))
  323. discoveredIds := make([]string, len(projectGroups))
  324. for i, group := range projectGroups {
  325. discoveredIds[i] = strconv.Itoa(group.ID)
  326. }
  327. g.store.GroupIDs = discoveredIds
  328. }
  329. return nil
  330. }
  331. // Validate will use the gitlab projectVariablesClient/groupVariablesClient to validate the gitlab provider using the ListVariable call to ensure get permissions without needing a specific key.
  332. func (g *gitlabBase) Validate() (esv1.ValidationResult, error) {
  333. if g.store.ProjectID != "" {
  334. _, resp, err := g.projectVariablesClient.ListVariables(g.store.ProjectID, nil)
  335. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabProjectListVariables, err)
  336. if err != nil {
  337. return esv1.ValidationResultError, fmt.Errorf(errList, err)
  338. } else if resp == nil || resp.StatusCode != http.StatusOK {
  339. return esv1.ValidationResultError, fmt.Errorf(errProjectAuth, g.store.ProjectID)
  340. }
  341. err = g.ResolveGroupIds()
  342. if err != nil {
  343. return esv1.ValidationResultError, fmt.Errorf(errList, err)
  344. }
  345. log.V(1).Info("discovered project groups", "name", g.store.GroupIDs)
  346. }
  347. if len(g.store.GroupIDs) > 0 {
  348. for _, groupID := range g.store.GroupIDs {
  349. _, resp, err := g.groupVariablesClient.ListVariables(groupID, nil)
  350. metrics.ObserveAPICall(constants.ProviderGitLab, constants.CallGitLabGroupListVariables, err)
  351. if err != nil {
  352. return esv1.ValidationResultError, fmt.Errorf(errList, err)
  353. } else if resp == nil || resp.StatusCode != http.StatusOK {
  354. return esv1.ValidationResultError, fmt.Errorf(errGroupAuth, groupID)
  355. }
  356. }
  357. }
  358. return esv1.ValidationResultReady, nil
  359. }