client.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "errors"
  19. "fmt"
  20. "reflect"
  21. "strings"
  22. "github.com/tidwall/gjson"
  23. v1 "k8s.io/api/core/v1"
  24. apierrors "k8s.io/apimachinery/pkg/api/errors"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/labels"
  27. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  28. "github.com/external-secrets/external-secrets/pkg/constants"
  29. "github.com/external-secrets/external-secrets/pkg/find"
  30. "github.com/external-secrets/external-secrets/pkg/metrics"
  31. "github.com/external-secrets/external-secrets/pkg/utils"
  32. )
  33. const (
  34. metaLabels = "labels"
  35. metaAnnotations = "annotations"
  36. )
  37. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  38. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  39. if err != nil {
  40. return nil, err
  41. }
  42. // if property is not defined, we will return the json-serialized secret
  43. if ref.Property == "" {
  44. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  45. m := map[string]map[string]string{}
  46. m[metaLabels] = secret.Labels
  47. m[metaAnnotations] = secret.Annotations
  48. j, err := utils.JSONMarshal(m)
  49. if err != nil {
  50. return nil, err
  51. }
  52. return j, nil
  53. }
  54. m := map[string]string{}
  55. for key, val := range secret.Data {
  56. m[key] = string(val)
  57. }
  58. j, err := utils.JSONMarshal(m)
  59. if err != nil {
  60. return nil, err
  61. }
  62. return j, nil
  63. }
  64. return getSecret(secret, ref)
  65. }
  66. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  67. if remoteRef.GetProperty() == "" {
  68. return errors.New("requires property in RemoteRef to delete secret value")
  69. }
  70. extSecret, getErr := c.userSecretClient.Get(ctx, remoteRef.GetRemoteKey(), metav1.GetOptions{})
  71. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  72. if getErr != nil {
  73. if apierrors.IsNotFound(getErr) {
  74. // return gracefully if no secret exists
  75. return nil
  76. }
  77. return getErr
  78. }
  79. if _, ok := extSecret.Data[remoteRef.GetProperty()]; !ok {
  80. // return gracefully if specified secret does not contain the given property
  81. return nil
  82. }
  83. if len(extSecret.Data) > 1 {
  84. return c.removeProperty(ctx, extSecret, remoteRef)
  85. }
  86. return c.fullDelete(ctx, remoteRef.GetRemoteKey())
  87. }
  88. func (c *Client) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  89. return false, errors.New("not implemented")
  90. }
  91. func (c *Client) PushSecret(ctx context.Context, secret *v1.Secret, data esv1beta1.PushSecretData) error {
  92. if data.GetProperty() == "" && data.GetSecretKey() != "" {
  93. return errors.New("requires property in RemoteRef to push secret value if secret key is defined")
  94. }
  95. extSecret, getErr := c.userSecretClient.Get(ctx, data.GetRemoteKey(), metav1.GetOptions{})
  96. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  97. if getErr != nil {
  98. // create if it not exists
  99. if apierrors.IsNotFound(getErr) {
  100. typ := v1.SecretTypeOpaque
  101. if secret.Type != "" {
  102. typ = secret.Type
  103. }
  104. return c.createSecret(ctx, secret, typ, data)
  105. }
  106. return getErr
  107. }
  108. // the whole secret was pushed to the provider
  109. if data.GetSecretKey() == "" {
  110. if data.GetProperty() != "" {
  111. value, err := c.marshalData(secret)
  112. if err != nil {
  113. return err
  114. }
  115. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, value) {
  116. return nil
  117. }
  118. return c.updateProperty(ctx, extSecret, data, value)
  119. }
  120. if reflect.DeepEqual(extSecret.Data, secret.Data) {
  121. return nil
  122. }
  123. return c.updateMap(ctx, extSecret, secret.Data)
  124. }
  125. // only a single property was pushed
  126. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, secret.Data[data.GetSecretKey()]) {
  127. return nil
  128. }
  129. return c.updateProperty(ctx, extSecret, data, secret.Data[data.GetSecretKey()])
  130. }
  131. func (c *Client) marshalData(secret *v1.Secret) ([]byte, error) {
  132. values := make(map[string]string)
  133. for k, v := range secret.Data {
  134. values[k] = string(v)
  135. }
  136. // marshal
  137. value, err := utils.JSONMarshal(values)
  138. if err != nil {
  139. return nil, fmt.Errorf("failed to marshal secrets into a single property: %w", err)
  140. }
  141. return value, nil
  142. }
  143. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  144. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  145. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  146. if apierrors.IsNotFound(err) {
  147. return nil, esv1beta1.NoSecretError{}
  148. }
  149. if err != nil {
  150. return nil, err
  151. }
  152. var tmpMap map[string][]byte
  153. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  154. tmpMap, err = getSecretMetadata(secret)
  155. if err != nil {
  156. return nil, err
  157. }
  158. } else {
  159. tmpMap = secret.Data
  160. }
  161. if ref.Property != "" {
  162. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  163. if err != nil {
  164. return nil, err
  165. }
  166. return retMap, nil
  167. }
  168. return tmpMap, nil
  169. }
  170. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  171. byteArr, err := utils.JSONMarshal(tmpMap)
  172. if err != nil {
  173. return nil, err
  174. }
  175. var retMap map[string][]byte
  176. jsonStr := string(byteArr)
  177. // We need to search if a given key with a . exists before using gjson operations.
  178. idx := strings.Index(property, ".")
  179. if idx > -1 {
  180. refProperty := strings.ReplaceAll(property, ".", "\\.")
  181. retMap, err = getMapFromValues(refProperty, jsonStr)
  182. if err != nil {
  183. return nil, err
  184. }
  185. if retMap != nil {
  186. return retMap, nil
  187. }
  188. }
  189. retMap, err = getMapFromValues(property, jsonStr)
  190. if err != nil {
  191. return nil, err
  192. }
  193. if retMap == nil {
  194. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  195. }
  196. return retMap, nil
  197. }
  198. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  199. val := gjson.Get(jsonStr, property)
  200. if val.Exists() {
  201. retMap := make(map[string][]byte)
  202. var tmpMap map[string]any
  203. decoded, err := base64.StdEncoding.DecodeString(val.String())
  204. if err != nil {
  205. return nil, err
  206. }
  207. err = json.Unmarshal(decoded, &tmpMap)
  208. if err != nil {
  209. return nil, err
  210. }
  211. for k, v := range tmpMap {
  212. b, err := utils.JSONMarshal(v)
  213. if err != nil {
  214. return nil, err
  215. }
  216. retMap[k] = b
  217. }
  218. return retMap, nil
  219. }
  220. return nil, nil
  221. }
  222. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  223. var err error
  224. tmpMap := make(map[string][]byte)
  225. tmpMap[metaLabels], err = utils.JSONMarshal(secret.ObjectMeta.Labels)
  226. if err != nil {
  227. return nil, err
  228. }
  229. tmpMap[metaAnnotations], err = utils.JSONMarshal(secret.ObjectMeta.Annotations)
  230. if err != nil {
  231. return nil, err
  232. }
  233. return tmpMap, nil
  234. }
  235. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  236. if ref.Tags != nil {
  237. return c.findByTags(ctx, ref)
  238. }
  239. if ref.Name != nil {
  240. return c.findByName(ctx, ref)
  241. }
  242. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  243. }
  244. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  245. // empty/nil tags = everything
  246. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  247. if err != nil {
  248. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  249. }
  250. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  251. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  252. if err != nil {
  253. return nil, fmt.Errorf("unable to list secrets: %w", err)
  254. }
  255. data := make(map[string][]byte)
  256. for _, secret := range secrets.Items {
  257. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  258. if err != nil {
  259. return nil, err
  260. }
  261. data[secret.Name] = jsonStr
  262. }
  263. return utils.ConvertKeys(ref.ConversionStrategy, data)
  264. }
  265. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  266. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  267. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  268. if err != nil {
  269. return nil, fmt.Errorf("unable to list secrets: %w", err)
  270. }
  271. matcher, err := find.New(*ref.Name)
  272. if err != nil {
  273. return nil, err
  274. }
  275. data := make(map[string][]byte)
  276. for _, secret := range secrets.Items {
  277. if !matcher.MatchName(secret.Name) {
  278. continue
  279. }
  280. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  281. if err != nil {
  282. return nil, err
  283. }
  284. data[secret.Name] = jsonStr
  285. }
  286. return utils.ConvertKeys(ref.ConversionStrategy, data)
  287. }
  288. func (c *Client) Close(_ context.Context) error {
  289. return nil
  290. }
  291. func convertMap(in map[string][]byte) map[string]string {
  292. out := make(map[string]string)
  293. for k, v := range in {
  294. out[k] = string(v)
  295. }
  296. return out
  297. }
  298. func (c *Client) createSecret(ctx context.Context, secret *v1.Secret, typed v1.SecretType, remoteRef esv1beta1.PushSecretData) error {
  299. data := make(map[string][]byte)
  300. if remoteRef.GetProperty() != "" {
  301. // set a specific remote key
  302. if remoteRef.GetSecretKey() == "" {
  303. value, err := c.marshalData(secret)
  304. if err != nil {
  305. return err
  306. }
  307. data[remoteRef.GetProperty()] = value
  308. } else {
  309. // push a specific secret key into a specific remote property
  310. data[remoteRef.GetProperty()] = secret.Data[remoteRef.GetSecretKey()]
  311. }
  312. } else {
  313. // push the whole secret as is using each key of the secret as a property in the created secret
  314. data = secret.Data
  315. }
  316. s := v1.Secret{
  317. ObjectMeta: metav1.ObjectMeta{
  318. Name: remoteRef.GetRemoteKey(),
  319. Namespace: c.store.RemoteNamespace,
  320. },
  321. Data: data,
  322. Type: typed,
  323. }
  324. _, err := c.userSecretClient.Create(ctx, &s, metav1.CreateOptions{})
  325. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesCreateSecret, err)
  326. return err
  327. }
  328. // fullDelete removes remote secret completely.
  329. func (c *Client) fullDelete(ctx context.Context, secretName string) error {
  330. err := c.userSecretClient.Delete(ctx, secretName, metav1.DeleteOptions{})
  331. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesDeleteSecret, err)
  332. // gracefully return on not found
  333. if apierrors.IsNotFound(err) {
  334. return nil
  335. }
  336. return err
  337. }
  338. // removeProperty removes single data property from remote secret.
  339. func (c *Client) removeProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef) error {
  340. delete(extSecret.Data, remoteRef.GetProperty())
  341. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  342. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  343. return err
  344. }
  345. func (c *Client) updateMap(ctx context.Context, extSecret *v1.Secret, values map[string][]byte) error {
  346. // update the existing map with values from the pushed secret but keep existing values in tack.
  347. for k, v := range values {
  348. extSecret.Data[k] = v
  349. }
  350. return c.updateSecret(ctx, extSecret)
  351. }
  352. func (c *Client) updateProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef, value []byte) error {
  353. if extSecret.Data == nil {
  354. extSecret.Data = make(map[string][]byte)
  355. }
  356. // otherwise update remote secret
  357. extSecret.Data[remoteRef.GetProperty()] = value
  358. return c.updateSecret(ctx, extSecret)
  359. }
  360. func (c *Client) updateSecret(ctx context.Context, extSecret *v1.Secret) error {
  361. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  362. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  363. return err
  364. }
  365. func getSecret(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  366. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  367. s, found, err := getFromSecretMetadata(secret, ref)
  368. if err != nil {
  369. return nil, err
  370. }
  371. if !found {
  372. return nil, fmt.Errorf("property %s does not exist in metadata of secret %q", ref.Property, ref.Key)
  373. }
  374. return s, nil
  375. }
  376. s, found := getFromSecretData(secret, ref)
  377. if !found {
  378. return nil, fmt.Errorf("property %s does not exist in data of secret %q", ref.Property, ref.Key)
  379. }
  380. return s, nil
  381. }
  382. func getFromSecretData(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool) {
  383. // Check if a property with "." exists first such as file.png
  384. v, ok := secret.Data[ref.Property]
  385. if ok {
  386. return v, true
  387. }
  388. idx := strings.Index(ref.Property, ".")
  389. if idx == -1 || idx == 0 || idx == len(ref.Property)-1 {
  390. return nil, false
  391. }
  392. v, ok = secret.Data[ref.Property[:idx]]
  393. if !ok {
  394. return nil, false
  395. }
  396. val := gjson.Get(string(v), ref.Property[idx+1:])
  397. if !val.Exists() {
  398. return nil, false
  399. }
  400. return []byte(val.String()), true
  401. }
  402. func getFromSecretMetadata(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool, error) {
  403. path := strings.Split(ref.Property, ".")
  404. var metadata map[string]string
  405. switch path[0] {
  406. case metaLabels:
  407. metadata = secret.Labels
  408. case metaAnnotations:
  409. metadata = secret.Annotations
  410. default:
  411. return nil, false, nil
  412. }
  413. if len(path) == 1 {
  414. j, err := utils.JSONMarshal(metadata)
  415. if err != nil {
  416. return nil, false, err
  417. }
  418. return j, true, nil
  419. }
  420. v, ok := metadata[path[1]]
  421. if !ok {
  422. return nil, false, nil
  423. }
  424. if len(path) == 2 {
  425. return []byte(v), true, nil
  426. }
  427. val := gjson.Get(v, strings.Join(path[2:], ""))
  428. if !val.Exists() {
  429. return nil, false, nil
  430. }
  431. return []byte(val.String()), true, nil
  432. }