pulumi.go 3.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package pulumi
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "time"
  19. esc "github.com/pulumi/esc/cmd/esc/cli/client"
  20. corev1 "k8s.io/api/core/v1"
  21. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  22. "github.com/external-secrets/external-secrets/pkg/utils"
  23. )
  24. type client struct {
  25. escClient esc.Client
  26. environment string
  27. organization string
  28. }
  29. const (
  30. errPushSecretsNotSupported = "pushing secrets is currently not supported by Pulumi"
  31. errDeleteSecretsNotSupported = "deleting secrets is currently not supported by Pulumi"
  32. errGettingSecrets = "error getting secret %s: %w"
  33. errUnmarshalSecret = "unable to unmarshal secret: %w"
  34. errUnableToGetValues = "unable to get value for key %s: %w"
  35. errGettingAllSecretsNotSupported = "getting all secrets is currently not supported by Pulumi"
  36. )
  37. var _ esv1beta1.SecretsClient = &client{}
  38. func (c *client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  39. x, _, err := c.escClient.OpenEnvironment(ctx, c.organization, c.environment, 5*time.Minute)
  40. if err != nil {
  41. return nil, err
  42. }
  43. value, err := c.escClient.GetOpenProperty(ctx, c.organization, c.environment, x, ref.Key)
  44. if err != nil {
  45. return nil, err
  46. }
  47. return utils.GetByteValue(value.ToJSON(false))
  48. }
  49. func (c *client) PushSecret(_ context.Context, _ *corev1.Secret, _ esv1beta1.PushSecretData) error {
  50. return errors.New(errPushSecretsNotSupported)
  51. }
  52. func (c *client) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  53. return false, errors.New(errPushSecretsNotSupported)
  54. }
  55. func (c *client) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  56. return errors.New(errDeleteSecretsNotSupported)
  57. }
  58. func (c *client) Validate() (esv1beta1.ValidationResult, error) {
  59. return esv1beta1.ValidationResultReady, nil
  60. }
  61. func (c *client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  62. data, err := c.GetSecret(ctx, ref)
  63. if err != nil {
  64. return nil, fmt.Errorf(errGettingSecrets, ref.Key, err)
  65. }
  66. kv := make(map[string]any)
  67. err = json.Unmarshal(data, &kv)
  68. if err != nil {
  69. return nil, fmt.Errorf(errUnmarshalSecret, err)
  70. }
  71. secretData := make(map[string][]byte)
  72. for k, v := range kv {
  73. secretData[k], err = utils.GetByteValue(v)
  74. if err != nil {
  75. return nil, fmt.Errorf(errUnableToGetValues, k, err)
  76. }
  77. }
  78. return secretData, nil
  79. }
  80. func (c *client) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  81. return nil, errors.New(errGettingAllSecretsNotSupported)
  82. }
  83. func (c *client) Close(context.Context) error {
  84. return nil
  85. }