client.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package secretmanager
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "maps"
  19. "strconv"
  20. "strings"
  21. secretmanager "cloud.google.com/go/secretmanager/apiv1"
  22. "cloud.google.com/go/secretmanager/apiv1/secretmanagerpb"
  23. "github.com/googleapis/gax-go/v2"
  24. "github.com/googleapis/gax-go/v2/apierror"
  25. "github.com/tidwall/gjson"
  26. "google.golang.org/api/iterator"
  27. "google.golang.org/genproto/protobuf/field_mask"
  28. "google.golang.org/grpc/codes"
  29. "google.golang.org/grpc/status"
  30. corev1 "k8s.io/api/core/v1"
  31. ctrl "sigs.k8s.io/controller-runtime"
  32. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  33. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  34. "github.com/external-secrets/external-secrets/pkg/constants"
  35. "github.com/external-secrets/external-secrets/pkg/find"
  36. "github.com/external-secrets/external-secrets/pkg/metrics"
  37. "github.com/external-secrets/external-secrets/pkg/provider/util/locks"
  38. "github.com/external-secrets/external-secrets/pkg/utils"
  39. )
  40. const (
  41. CloudPlatformRole = "https://www.googleapis.com/auth/cloud-platform"
  42. defaultVersion = "latest"
  43. errGCPSMStore = "received invalid GCPSM SecretStore resource"
  44. errUnableGetCredentials = "unable to get credentials: %w"
  45. errClientClose = "unable to close SecretManager client: %w"
  46. errMissingStoreSpec = "invalid: missing store spec"
  47. errFetchSAKSecret = "could not fetch SecretAccessKey secret: %w"
  48. errUnableProcessJSONCredentials = "failed to process the provided JSON credentials: %w"
  49. errUnableCreateGCPSMClient = "failed to create GCP secretmanager client: %w"
  50. errUninitalizedGCPProvider = "provider GCP is not initialized"
  51. errClientGetSecretAccess = "unable to access Secret from SecretManager Client: %w"
  52. errJSONSecretUnmarshal = "unable to unmarshal secret: %w"
  53. errInvalidStore = "invalid store"
  54. errInvalidStoreSpec = "invalid store spec"
  55. errInvalidStoreProv = "invalid store provider"
  56. errInvalidGCPProv = "invalid gcp secrets manager provider"
  57. errInvalidAuthSecretRef = "invalid auth secret data: %w"
  58. errInvalidWISARef = "invalid workload identity service account reference: %w"
  59. errUnexpectedFindOperator = "unexpected find operator"
  60. managedByKey = "managed-by"
  61. managedByValue = "external-secrets"
  62. providerName = "GCPSecretManager"
  63. )
  64. type Client struct {
  65. smClient GoogleSecretManagerClient
  66. kube kclient.Client
  67. store *esv1beta1.GCPSMProvider
  68. storeKind string
  69. // namespace of the external secret
  70. namespace string
  71. workloadIdentity *workloadIdentity
  72. }
  73. type GoogleSecretManagerClient interface {
  74. DeleteSecret(ctx context.Context, req *secretmanagerpb.DeleteSecretRequest, opts ...gax.CallOption) error
  75. AccessSecretVersion(ctx context.Context, req *secretmanagerpb.AccessSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.AccessSecretVersionResponse, error)
  76. ListSecrets(ctx context.Context, req *secretmanagerpb.ListSecretsRequest, opts ...gax.CallOption) *secretmanager.SecretIterator
  77. AddSecretVersion(ctx context.Context, req *secretmanagerpb.AddSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.SecretVersion, error)
  78. CreateSecret(ctx context.Context, req *secretmanagerpb.CreateSecretRequest, opts ...gax.CallOption) (*secretmanagerpb.Secret, error)
  79. Close() error
  80. GetSecret(ctx context.Context, req *secretmanagerpb.GetSecretRequest, opts ...gax.CallOption) (*secretmanagerpb.Secret, error)
  81. UpdateSecret(context.Context, *secretmanagerpb.UpdateSecretRequest, ...gax.CallOption) (*secretmanagerpb.Secret, error)
  82. }
  83. var log = ctrl.Log.WithName("provider").WithName("gcp").WithName("secretsmanager")
  84. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  85. gcpSecret, err := c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  86. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  87. })
  88. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMGetSecret, err)
  89. if err != nil {
  90. if status.Code(err) == codes.NotFound {
  91. return nil
  92. }
  93. return err
  94. }
  95. if manager, ok := gcpSecret.Labels[managedByKey]; !ok || manager != managedByValue {
  96. return nil
  97. }
  98. deleteSecretVersionReq := &secretmanagerpb.DeleteSecretRequest{
  99. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, remoteRef.GetRemoteKey()),
  100. Etag: gcpSecret.Etag,
  101. }
  102. err = c.smClient.DeleteSecret(ctx, deleteSecretVersionReq)
  103. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMDeleteSecret, err)
  104. return err
  105. }
  106. func parseError(err error) error {
  107. var gerr *apierror.APIError
  108. if errors.As(err, &gerr) && gerr.GRPCStatus().Code() == codes.NotFound {
  109. return esv1beta1.NoSecretError{}
  110. }
  111. return err
  112. }
  113. func (c *Client) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  114. return false, fmt.Errorf("not implemented")
  115. }
  116. // PushSecret pushes a kubernetes secret key into gcp provider Secret.
  117. func (c *Client) PushSecret(ctx context.Context, secret *corev1.Secret, pushSecretData esv1beta1.PushSecretData) error {
  118. if pushSecretData.GetSecretKey() == "" {
  119. return fmt.Errorf("pushing the whole secret is not yet implemented")
  120. }
  121. payload := secret.Data[pushSecretData.GetSecretKey()]
  122. secretName := fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, pushSecretData.GetRemoteKey())
  123. gcpSecret, err := c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  124. Name: secretName,
  125. })
  126. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMGetSecret, err)
  127. if err != nil {
  128. if status.Code(err) != codes.NotFound {
  129. return err
  130. }
  131. var replication = &secretmanagerpb.Replication{
  132. Replication: &secretmanagerpb.Replication_Automatic_{
  133. Automatic: &secretmanagerpb.Replication_Automatic{},
  134. },
  135. }
  136. if c.store.Location != "" {
  137. replication = &secretmanagerpb.Replication{
  138. Replication: &secretmanagerpb.Replication_UserManaged_{
  139. UserManaged: &secretmanagerpb.Replication_UserManaged{
  140. Replicas: []*secretmanagerpb.Replication_UserManaged_Replica{
  141. {
  142. Location: c.store.Location,
  143. },
  144. },
  145. },
  146. },
  147. }
  148. }
  149. gcpSecret, err = c.smClient.CreateSecret(ctx, &secretmanagerpb.CreateSecretRequest{
  150. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  151. SecretId: pushSecretData.GetRemoteKey(),
  152. Secret: &secretmanagerpb.Secret{
  153. Labels: map[string]string{
  154. managedByKey: managedByValue,
  155. },
  156. Replication: replication,
  157. },
  158. })
  159. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMCreateSecret, err)
  160. if err != nil {
  161. return err
  162. }
  163. }
  164. builder, err := newPushSecretBuilder(payload, pushSecretData)
  165. if err != nil {
  166. return err
  167. }
  168. annotations, labels, err := builder.buildMetadata(gcpSecret.Annotations, gcpSecret.Labels)
  169. if err != nil {
  170. return err
  171. }
  172. if !maps.Equal(gcpSecret.Annotations, annotations) || !maps.Equal(gcpSecret.Labels, labels) {
  173. scrt := &secretmanagerpb.Secret{
  174. Name: gcpSecret.Name,
  175. Etag: gcpSecret.Etag,
  176. Labels: labels,
  177. Annotations: annotations,
  178. }
  179. if c.store.Location != "" {
  180. scrt.Replication = &secretmanagerpb.Replication{
  181. Replication: &secretmanagerpb.Replication_UserManaged_{
  182. UserManaged: &secretmanagerpb.Replication_UserManaged{
  183. Replicas: []*secretmanagerpb.Replication_UserManaged_Replica{
  184. {
  185. Location: c.store.Location,
  186. },
  187. },
  188. },
  189. },
  190. }
  191. }
  192. _, err = c.smClient.UpdateSecret(ctx, &secretmanagerpb.UpdateSecretRequest{
  193. Secret: scrt,
  194. UpdateMask: &field_mask.FieldMask{
  195. Paths: []string{"labels", "annotations"},
  196. },
  197. })
  198. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMUpdateSecret, err)
  199. if err != nil {
  200. return err
  201. }
  202. }
  203. unlock, err := locks.TryLock(providerName, secretName)
  204. if err != nil {
  205. return err
  206. }
  207. defer unlock()
  208. gcpVersion, err := c.smClient.AccessSecretVersion(ctx, &secretmanagerpb.AccessSecretVersionRequest{
  209. Name: fmt.Sprintf("%s/versions/latest", secretName),
  210. })
  211. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAccessSecretVersion, err)
  212. if err != nil && status.Code(err) != codes.NotFound {
  213. return err
  214. }
  215. if gcpVersion != nil && gcpVersion.Payload != nil && !builder.needUpdate(gcpVersion.Payload.Data) {
  216. return nil
  217. }
  218. var original []byte
  219. if gcpVersion != nil && gcpVersion.Payload != nil {
  220. original = gcpVersion.Payload.Data
  221. }
  222. data, err := builder.buildData(original)
  223. if err != nil {
  224. return err
  225. }
  226. addSecretVersionReq := &secretmanagerpb.AddSecretVersionRequest{
  227. Parent: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, pushSecretData.GetRemoteKey()),
  228. Payload: &secretmanagerpb.SecretPayload{
  229. Data: data,
  230. },
  231. }
  232. _, err = c.smClient.AddSecretVersion(ctx, addSecretVersionReq)
  233. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAddSecretVersion, err)
  234. return err
  235. }
  236. // GetAllSecrets syncs multiple secrets from gcp provider into a single Kubernetes Secret.
  237. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  238. if ref.Name != nil {
  239. return c.findByName(ctx, ref)
  240. }
  241. if len(ref.Tags) > 0 {
  242. return c.findByTags(ctx, ref)
  243. }
  244. return nil, errors.New(errUnexpectedFindOperator)
  245. }
  246. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  247. // regex matcher
  248. matcher, err := find.New(*ref.Name)
  249. if err != nil {
  250. return nil, err
  251. }
  252. req := &secretmanagerpb.ListSecretsRequest{
  253. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  254. }
  255. if ref.Path != nil {
  256. req.Filter = fmt.Sprintf("name:%s", *ref.Path)
  257. }
  258. // Call the API.
  259. it := c.smClient.ListSecrets(ctx, req)
  260. secretMap := make(map[string][]byte)
  261. var resp *secretmanagerpb.Secret
  262. defer metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMListSecrets, err)
  263. for {
  264. resp, err = it.Next()
  265. if errors.Is(err, iterator.Done) {
  266. break
  267. }
  268. if err != nil {
  269. return nil, fmt.Errorf("failed to list secrets: %w", err)
  270. }
  271. log.V(1).Info("gcp sm findByName found", "secrets", strconv.Itoa(it.PageInfo().Remaining()))
  272. key := c.trimName(resp.Name)
  273. // If we don't match we skip.
  274. // Also, if we have path, and it is not at the beguining we skip.
  275. // We have to check if path is at the beguining of the key because
  276. // there is no way to create a `name:%s*` (starts with) filter
  277. // At https://cloud.google.com/secret-manager/docs/filtering you can use `*`
  278. // but not like that it seems.
  279. if !matcher.MatchName(key) || (ref.Path != nil && !strings.HasPrefix(key, *ref.Path)) {
  280. continue
  281. }
  282. log.V(1).Info("gcp sm findByName matches", "name", resp.Name)
  283. secretMap[key], err = c.getData(ctx, key)
  284. if err != nil {
  285. return nil, err
  286. }
  287. }
  288. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  289. }
  290. func (c *Client) getData(ctx context.Context, key string) ([]byte, error) {
  291. dataRef := esv1beta1.ExternalSecretDataRemoteRef{
  292. Key: key,
  293. }
  294. data, err := c.GetSecret(ctx, dataRef)
  295. if err != nil {
  296. return []byte(""), err
  297. }
  298. return data, nil
  299. }
  300. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  301. var tagFilter string
  302. for k, v := range ref.Tags {
  303. tagFilter = fmt.Sprintf("%slabels.%s=%s ", tagFilter, k, v)
  304. }
  305. tagFilter = strings.TrimSuffix(tagFilter, " ")
  306. if ref.Path != nil {
  307. tagFilter = fmt.Sprintf("%s name:%s", tagFilter, *ref.Path)
  308. }
  309. req := &secretmanagerpb.ListSecretsRequest{
  310. Parent: fmt.Sprintf("projects/%s", c.store.ProjectID),
  311. }
  312. log.V(1).Info("gcp sm findByTags", "tagFilter", tagFilter)
  313. req.Filter = tagFilter
  314. // Call the API.
  315. it := c.smClient.ListSecrets(ctx, req)
  316. var resp *secretmanagerpb.Secret
  317. var err error
  318. defer metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMListSecrets, err)
  319. secretMap := make(map[string][]byte)
  320. for {
  321. resp, err = it.Next()
  322. if errors.Is(err, iterator.Done) {
  323. break
  324. }
  325. if err != nil {
  326. return nil, fmt.Errorf("failed to list secrets: %w", err)
  327. }
  328. key := c.trimName(resp.Name)
  329. if ref.Path != nil && !strings.HasPrefix(key, *ref.Path) {
  330. continue
  331. }
  332. log.V(1).Info("gcp sm findByTags matches tags", "name", resp.Name)
  333. secretMap[key], err = c.getData(ctx, key)
  334. if err != nil {
  335. return nil, err
  336. }
  337. }
  338. return utils.ConvertKeys(ref.ConversionStrategy, secretMap)
  339. }
  340. func (c *Client) trimName(name string) string {
  341. projectIDNumuber := c.extractProjectIDNumber(name)
  342. key := strings.TrimPrefix(name, fmt.Sprintf("projects/%s/secrets/", projectIDNumuber))
  343. return key
  344. }
  345. // extractProjectIDNumber grabs the project id from the full name returned by gcp api
  346. // gcp api seems to always return the number and not the project name
  347. // (and users would always use the name, while requests accept both).
  348. func (c *Client) extractProjectIDNumber(secretFullName string) string {
  349. s := strings.Split(secretFullName, "/")
  350. ProjectIDNumuber := s[1]
  351. return ProjectIDNumuber
  352. }
  353. // GetSecret returns a single secret from the provider.
  354. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  355. if utils.IsNil(c.smClient) || c.store.ProjectID == "" {
  356. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  357. }
  358. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  359. return c.getSecretMetadata(ctx, ref)
  360. }
  361. version := ref.Version
  362. if version == "" {
  363. version = defaultVersion
  364. }
  365. req := &secretmanagerpb.AccessSecretVersionRequest{
  366. Name: fmt.Sprintf("projects/%s/secrets/%s/versions/%s", c.store.ProjectID, ref.Key, version),
  367. }
  368. result, err := c.smClient.AccessSecretVersion(ctx, req)
  369. metrics.ObserveAPICall(constants.ProviderGCPSM, constants.CallGCPSMAccessSecretVersion, err)
  370. err = parseError(err)
  371. if err != nil {
  372. return nil, fmt.Errorf(errClientGetSecretAccess, err)
  373. }
  374. if ref.Property == "" {
  375. if result.Payload.Data != nil {
  376. return result.Payload.Data, nil
  377. }
  378. return nil, fmt.Errorf("invalid secret received. no secret string for key: %s", ref.Key)
  379. }
  380. val := getDataByProperty(result.Payload.Data, ref.Property)
  381. if !val.Exists() {
  382. return nil, fmt.Errorf("key %s does not exist in secret %s", ref.Property, ref.Key)
  383. }
  384. return []byte(val.String()), nil
  385. }
  386. func (c *Client) getSecretMetadata(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  387. secret, err := c.smClient.GetSecret(ctx, &secretmanagerpb.GetSecretRequest{
  388. Name: fmt.Sprintf("projects/%s/secrets/%s", c.store.ProjectID, ref.Key),
  389. })
  390. err = parseError(err)
  391. if err != nil {
  392. return nil, fmt.Errorf(errClientGetSecretAccess, err)
  393. }
  394. const (
  395. annotations = "annotations"
  396. labels = "labels"
  397. )
  398. extractMetadataKey := func(s string, p string) string {
  399. prefix := p + "."
  400. if !strings.HasPrefix(s, prefix) {
  401. return ""
  402. }
  403. return strings.TrimPrefix(s, prefix)
  404. }
  405. if annotation := extractMetadataKey(ref.Property, annotations); annotation != "" {
  406. v, ok := secret.GetAnnotations()[annotation]
  407. if !ok {
  408. return nil, fmt.Errorf("annotation with key %s does not exist in secret %s", annotation, ref.Key)
  409. }
  410. return []byte(v), nil
  411. }
  412. if label := extractMetadataKey(ref.Property, labels); label != "" {
  413. v, ok := secret.GetLabels()[label]
  414. if !ok {
  415. return nil, fmt.Errorf("label with key %s does not exist in secret %s", label, ref.Key)
  416. }
  417. return []byte(v), nil
  418. }
  419. if ref.Property == annotations {
  420. j, err := json.Marshal(secret.GetAnnotations())
  421. if err != nil {
  422. return nil, fmt.Errorf("faild marshaling annotations into json: %w", err)
  423. }
  424. return j, nil
  425. }
  426. if ref.Property == labels {
  427. j, err := json.Marshal(secret.GetLabels())
  428. if err != nil {
  429. return nil, fmt.Errorf("faild marshaling labels into json: %w", err)
  430. }
  431. return j, nil
  432. }
  433. if ref.Property != "" {
  434. return nil, fmt.Errorf("invalid property %s: metadata property should start with either %s or %s", ref.Property, annotations, labels)
  435. }
  436. j, err := json.Marshal(map[string]map[string]string{
  437. "annotations": secret.GetAnnotations(),
  438. "labels": secret.GetLabels(),
  439. })
  440. if err != nil {
  441. return nil, fmt.Errorf("faild marshaling metadata map into json: %w", err)
  442. }
  443. return j, nil
  444. }
  445. // GetSecretMap returns multiple k/v pairs from the provider.
  446. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  447. if c.smClient == nil || c.store.ProjectID == "" {
  448. return nil, fmt.Errorf(errUninitalizedGCPProvider)
  449. }
  450. data, err := c.GetSecret(ctx, ref)
  451. if err != nil {
  452. return nil, err
  453. }
  454. kv := make(map[string]json.RawMessage)
  455. err = json.Unmarshal(data, &kv)
  456. if err != nil {
  457. return nil, fmt.Errorf(errJSONSecretUnmarshal, err)
  458. }
  459. secretData := make(map[string][]byte)
  460. for k, v := range kv {
  461. var strVal string
  462. err = json.Unmarshal(v, &strVal)
  463. if err == nil {
  464. secretData[k] = []byte(strVal)
  465. } else {
  466. secretData[k] = v
  467. }
  468. }
  469. return secretData, nil
  470. }
  471. func (c *Client) Close(_ context.Context) error {
  472. var err error
  473. if c.smClient != nil {
  474. err = c.smClient.Close()
  475. }
  476. if c.workloadIdentity != nil {
  477. err = c.workloadIdentity.Close()
  478. }
  479. useMu.Unlock()
  480. if err != nil {
  481. return fmt.Errorf(errClientClose, err)
  482. }
  483. return nil
  484. }
  485. func (c *Client) Validate() (esv1beta1.ValidationResult, error) {
  486. if c.storeKind == esv1beta1.ClusterSecretStoreKind && isReferentSpec(c.store) {
  487. return esv1beta1.ValidationResultUnknown, nil
  488. }
  489. return esv1beta1.ValidationResultReady, nil
  490. }
  491. func getDataByProperty(data []byte, property string) gjson.Result {
  492. var payload string
  493. if data != nil {
  494. payload = string(data)
  495. }
  496. idx := strings.Index(property, ".")
  497. refProperty := property
  498. if idx > 0 {
  499. refProperty = strings.ReplaceAll(refProperty, ".", "\\.")
  500. val := gjson.Get(payload, refProperty)
  501. if val.Exists() {
  502. return val
  503. }
  504. }
  505. return gjson.Get(payload, property)
  506. }