client.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "fmt"
  19. "reflect"
  20. "strings"
  21. "github.com/tidwall/gjson"
  22. v1 "k8s.io/api/core/v1"
  23. apierrors "k8s.io/apimachinery/pkg/api/errors"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "k8s.io/apimachinery/pkg/labels"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. "github.com/external-secrets/external-secrets/pkg/constants"
  28. "github.com/external-secrets/external-secrets/pkg/find"
  29. "github.com/external-secrets/external-secrets/pkg/metrics"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. )
  32. const (
  33. metaLabels = "labels"
  34. metaAnnotations = "annotations"
  35. )
  36. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  37. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  38. if err != nil {
  39. return nil, err
  40. }
  41. // if property is not defined, we will return the json-serialized secret
  42. if ref.Property == "" {
  43. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  44. m := map[string]map[string]string{}
  45. m[metaLabels] = secret.Labels
  46. m[metaAnnotations] = secret.Annotations
  47. j, err := utils.JSONMarshal(m)
  48. if err != nil {
  49. return nil, err
  50. }
  51. return j, nil
  52. }
  53. m := map[string]string{}
  54. for key, val := range secret.Data {
  55. m[key] = string(val)
  56. }
  57. j, err := utils.JSONMarshal(m)
  58. if err != nil {
  59. return nil, err
  60. }
  61. return j, nil
  62. }
  63. return getSecret(secret, ref)
  64. }
  65. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  66. if remoteRef.GetProperty() == "" {
  67. return fmt.Errorf("requires property in RemoteRef to delete secret value")
  68. }
  69. extSecret, getErr := c.userSecretClient.Get(ctx, remoteRef.GetRemoteKey(), metav1.GetOptions{})
  70. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  71. if getErr != nil {
  72. if apierrors.IsNotFound(getErr) {
  73. // return gracefully if no secret exists
  74. return nil
  75. }
  76. return getErr
  77. }
  78. if _, ok := extSecret.Data[remoteRef.GetProperty()]; !ok {
  79. // return gracefully if specified secret does not contain the given property
  80. return nil
  81. }
  82. if len(extSecret.Data) > 1 {
  83. return c.removeProperty(ctx, extSecret, remoteRef)
  84. }
  85. return c.fullDelete(ctx, remoteRef.GetRemoteKey())
  86. }
  87. func (c *Client) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  88. return false, fmt.Errorf("not implemented")
  89. }
  90. func (c *Client) PushSecret(ctx context.Context, secret *v1.Secret, data esv1beta1.PushSecretData) error {
  91. if data.GetProperty() == "" && data.GetSecretKey() != "" {
  92. return fmt.Errorf("requires property in RemoteRef to push secret value if secret key is defined")
  93. }
  94. extSecret, getErr := c.userSecretClient.Get(ctx, data.GetRemoteKey(), metav1.GetOptions{})
  95. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  96. if getErr != nil {
  97. // create if it not exists
  98. if apierrors.IsNotFound(getErr) {
  99. typ := v1.SecretTypeOpaque
  100. if secret.Type != "" {
  101. typ = secret.Type
  102. }
  103. return c.createSecret(ctx, secret, typ, data)
  104. }
  105. return getErr
  106. }
  107. // the whole secret was pushed to the provider
  108. if data.GetSecretKey() == "" {
  109. if data.GetProperty() != "" {
  110. value, err := c.marshalData(secret)
  111. if err != nil {
  112. return err
  113. }
  114. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, value) {
  115. return nil
  116. }
  117. return c.updateProperty(ctx, extSecret, data, value)
  118. }
  119. if reflect.DeepEqual(extSecret.Data, secret.Data) {
  120. return nil
  121. }
  122. return c.updateMap(ctx, extSecret, secret.Data)
  123. }
  124. // only a single property was pushed
  125. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, secret.Data[data.GetSecretKey()]) {
  126. return nil
  127. }
  128. return c.updateProperty(ctx, extSecret, data, secret.Data[data.GetSecretKey()])
  129. }
  130. func (c *Client) marshalData(secret *v1.Secret) ([]byte, error) {
  131. values := make(map[string]string)
  132. for k, v := range secret.Data {
  133. values[k] = string(v)
  134. }
  135. // marshal
  136. value, err := utils.JSONMarshal(values)
  137. if err != nil {
  138. return nil, fmt.Errorf("failed to marshal secrets into a single property: %w", err)
  139. }
  140. return value, nil
  141. }
  142. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  143. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  144. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  145. if apierrors.IsNotFound(err) {
  146. return nil, esv1beta1.NoSecretError{}
  147. }
  148. if err != nil {
  149. return nil, err
  150. }
  151. var tmpMap map[string][]byte
  152. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  153. tmpMap, err = getSecretMetadata(secret)
  154. if err != nil {
  155. return nil, err
  156. }
  157. } else {
  158. tmpMap = secret.Data
  159. }
  160. if ref.Property != "" {
  161. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  162. if err != nil {
  163. return nil, err
  164. }
  165. return retMap, nil
  166. }
  167. return tmpMap, nil
  168. }
  169. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  170. byteArr, err := utils.JSONMarshal(tmpMap)
  171. if err != nil {
  172. return nil, err
  173. }
  174. var retMap map[string][]byte
  175. jsonStr := string(byteArr)
  176. // We need to search if a given key with a . exists before using gjson operations.
  177. idx := strings.Index(property, ".")
  178. if idx > -1 {
  179. refProperty := strings.ReplaceAll(property, ".", "\\.")
  180. retMap, err = getMapFromValues(refProperty, jsonStr)
  181. if err != nil {
  182. return nil, err
  183. }
  184. if retMap != nil {
  185. return retMap, nil
  186. }
  187. }
  188. retMap, err = getMapFromValues(property, jsonStr)
  189. if err != nil {
  190. return nil, err
  191. }
  192. if retMap == nil {
  193. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  194. }
  195. return retMap, nil
  196. }
  197. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  198. val := gjson.Get(jsonStr, property)
  199. if val.Exists() {
  200. retMap := make(map[string][]byte)
  201. var tmpMap map[string]any
  202. decoded, err := base64.StdEncoding.DecodeString(val.String())
  203. if err != nil {
  204. return nil, err
  205. }
  206. err = json.Unmarshal(decoded, &tmpMap)
  207. if err != nil {
  208. return nil, err
  209. }
  210. for k, v := range tmpMap {
  211. b, err := utils.JSONMarshal(v)
  212. if err != nil {
  213. return nil, err
  214. }
  215. retMap[k] = b
  216. }
  217. return retMap, nil
  218. }
  219. return nil, nil
  220. }
  221. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  222. var err error
  223. tmpMap := make(map[string][]byte)
  224. tmpMap[metaLabels], err = utils.JSONMarshal(secret.ObjectMeta.Labels)
  225. if err != nil {
  226. return nil, err
  227. }
  228. tmpMap[metaAnnotations], err = utils.JSONMarshal(secret.ObjectMeta.Annotations)
  229. if err != nil {
  230. return nil, err
  231. }
  232. return tmpMap, nil
  233. }
  234. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  235. if ref.Tags != nil {
  236. return c.findByTags(ctx, ref)
  237. }
  238. if ref.Name != nil {
  239. return c.findByName(ctx, ref)
  240. }
  241. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  242. }
  243. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  244. // empty/nil tags = everything
  245. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  246. if err != nil {
  247. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  248. }
  249. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  250. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  251. if err != nil {
  252. return nil, fmt.Errorf("unable to list secrets: %w", err)
  253. }
  254. data := make(map[string][]byte)
  255. for _, secret := range secrets.Items {
  256. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  257. if err != nil {
  258. return nil, err
  259. }
  260. data[secret.Name] = jsonStr
  261. }
  262. return utils.ConvertKeys(ref.ConversionStrategy, data)
  263. }
  264. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  265. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  266. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  267. if err != nil {
  268. return nil, fmt.Errorf("unable to list secrets: %w", err)
  269. }
  270. matcher, err := find.New(*ref.Name)
  271. if err != nil {
  272. return nil, err
  273. }
  274. data := make(map[string][]byte)
  275. for _, secret := range secrets.Items {
  276. if !matcher.MatchName(secret.Name) {
  277. continue
  278. }
  279. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  280. if err != nil {
  281. return nil, err
  282. }
  283. data[secret.Name] = jsonStr
  284. }
  285. return utils.ConvertKeys(ref.ConversionStrategy, data)
  286. }
  287. func (c *Client) Close(_ context.Context) error {
  288. return nil
  289. }
  290. func convertMap(in map[string][]byte) map[string]string {
  291. out := make(map[string]string)
  292. for k, v := range in {
  293. out[k] = string(v)
  294. }
  295. return out
  296. }
  297. func (c *Client) createSecret(ctx context.Context, secret *v1.Secret, typed v1.SecretType, remoteRef esv1beta1.PushSecretData) error {
  298. data := make(map[string][]byte)
  299. if remoteRef.GetProperty() != "" {
  300. // set a specific remote key
  301. if remoteRef.GetSecretKey() == "" {
  302. value, err := c.marshalData(secret)
  303. if err != nil {
  304. return err
  305. }
  306. data[remoteRef.GetProperty()] = value
  307. } else {
  308. // push a specific secret key into a specific remote property
  309. data[remoteRef.GetProperty()] = secret.Data[remoteRef.GetSecretKey()]
  310. }
  311. } else {
  312. // push the whole secret as is using each key of the secret as a property in the created secret
  313. data = secret.Data
  314. }
  315. s := v1.Secret{
  316. ObjectMeta: metav1.ObjectMeta{
  317. Name: remoteRef.GetRemoteKey(),
  318. Namespace: c.store.RemoteNamespace,
  319. },
  320. Data: data,
  321. Type: typed,
  322. }
  323. _, err := c.userSecretClient.Create(ctx, &s, metav1.CreateOptions{})
  324. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesCreateSecret, err)
  325. return err
  326. }
  327. // fullDelete removes remote secret completely.
  328. func (c *Client) fullDelete(ctx context.Context, secretName string) error {
  329. err := c.userSecretClient.Delete(ctx, secretName, metav1.DeleteOptions{})
  330. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesDeleteSecret, err)
  331. // gracefully return on not found
  332. if apierrors.IsNotFound(err) {
  333. return nil
  334. }
  335. return err
  336. }
  337. // removeProperty removes single data property from remote secret.
  338. func (c *Client) removeProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef) error {
  339. delete(extSecret.Data, remoteRef.GetProperty())
  340. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  341. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  342. return err
  343. }
  344. func (c *Client) updateMap(ctx context.Context, extSecret *v1.Secret, values map[string][]byte) error {
  345. // update the existing map with values from the pushed secret but keep existing values in tack.
  346. for k, v := range values {
  347. extSecret.Data[k] = v
  348. }
  349. return c.updateSecret(ctx, extSecret)
  350. }
  351. func (c *Client) updateProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef, value []byte) error {
  352. if extSecret.Data == nil {
  353. extSecret.Data = make(map[string][]byte)
  354. }
  355. // otherwise update remote secret
  356. extSecret.Data[remoteRef.GetProperty()] = value
  357. return c.updateSecret(ctx, extSecret)
  358. }
  359. func (c *Client) updateSecret(ctx context.Context, extSecret *v1.Secret) error {
  360. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  361. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  362. return err
  363. }
  364. func getSecret(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  365. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  366. s, found, err := getFromSecretMetadata(secret, ref)
  367. if err != nil {
  368. return nil, err
  369. }
  370. if !found {
  371. return nil, fmt.Errorf("property %s does not exist in metadata of secret %q", ref.Property, ref.Key)
  372. }
  373. return s, nil
  374. }
  375. s, found := getFromSecretData(secret, ref)
  376. if !found {
  377. return nil, fmt.Errorf("property %s does not exist in data of secret %q", ref.Property, ref.Key)
  378. }
  379. return s, nil
  380. }
  381. func getFromSecretData(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool) {
  382. // Check if a property with "." exists first such as file.png
  383. v, ok := secret.Data[ref.Property]
  384. if ok {
  385. return v, true
  386. }
  387. idx := strings.Index(ref.Property, ".")
  388. if idx == -1 || idx == 0 || idx == len(ref.Property)-1 {
  389. return nil, false
  390. }
  391. v, ok = secret.Data[ref.Property[:idx]]
  392. if !ok {
  393. return nil, false
  394. }
  395. val := gjson.Get(string(v), ref.Property[idx+1:])
  396. if !val.Exists() {
  397. return nil, false
  398. }
  399. return []byte(val.String()), true
  400. }
  401. func getFromSecretMetadata(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool, error) {
  402. path := strings.Split(ref.Property, ".")
  403. var metadata map[string]string
  404. switch path[0] {
  405. case metaLabels:
  406. metadata = secret.Labels
  407. case metaAnnotations:
  408. metadata = secret.Annotations
  409. default:
  410. return nil, false, nil
  411. }
  412. if len(path) == 1 {
  413. j, err := utils.JSONMarshal(metadata)
  414. if err != nil {
  415. return nil, false, err
  416. }
  417. return j, true, nil
  418. }
  419. v, ok := metadata[path[1]]
  420. if !ok {
  421. return nil, false, nil
  422. }
  423. if len(path) == 2 {
  424. return []byte(v), true, nil
  425. }
  426. val := gjson.Get(v, strings.Join(path[2:], ""))
  427. if !val.Exists() {
  428. return nil, false, nil
  429. }
  430. return []byte(val.String()), true, nil
  431. }