client.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "context"
  15. "encoding/base64"
  16. "encoding/json"
  17. "fmt"
  18. "strings"
  19. "github.com/tidwall/gjson"
  20. v1 "k8s.io/api/core/v1"
  21. apierrors "k8s.io/apimachinery/pkg/api/errors"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. labels "k8s.io/apimachinery/pkg/labels"
  24. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  25. "github.com/external-secrets/external-secrets/pkg/constants"
  26. "github.com/external-secrets/external-secrets/pkg/find"
  27. "github.com/external-secrets/external-secrets/pkg/metrics"
  28. "github.com/external-secrets/external-secrets/pkg/utils"
  29. )
  30. const (
  31. metaLabels = "labels"
  32. metaAnnotations = "annotations"
  33. )
  34. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  35. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  36. if err != nil {
  37. return nil, err
  38. }
  39. var values map[string][]byte
  40. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  41. values, err = getSecretMetadata(secret)
  42. if err != nil {
  43. return nil, err
  44. }
  45. } else {
  46. values = secret.Data
  47. }
  48. byteArr, err := getSecretValues(values, ref.MetadataPolicy)
  49. if err != nil {
  50. return nil, err
  51. }
  52. if ref.Property != "" {
  53. jsonStr := string(byteArr)
  54. // We need to search if a given key with a . exists before using gjson operations.
  55. idx := strings.Index(ref.Property, ".")
  56. if idx > -1 {
  57. refProperty := strings.ReplaceAll(ref.Property, ".", "\\.")
  58. val := gjson.Get(jsonStr, refProperty)
  59. if val.Exists() {
  60. return []byte(val.String()), nil
  61. }
  62. }
  63. val := gjson.Get(jsonStr, ref.Property)
  64. if !val.Exists() {
  65. return nil, fmt.Errorf("property %s does not exist in key %s", ref.Property, ref.Key)
  66. }
  67. return []byte(val.String()), nil
  68. }
  69. return byteArr, nil
  70. }
  71. func getSecretValues(secretMap map[string][]byte, policy esv1beta1.ExternalSecretMetadataPolicy) ([]byte, error) {
  72. var byteArr []byte
  73. var err error
  74. if policy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  75. data := make(map[string]json.RawMessage, len(secretMap))
  76. for k, v := range secretMap {
  77. data[k] = v
  78. }
  79. byteArr, err = json.Marshal(data)
  80. } else {
  81. strMap := make(map[string]string)
  82. for k, v := range secretMap {
  83. strMap[k] = string(v)
  84. }
  85. byteArr, err = json.Marshal(strMap)
  86. }
  87. if err != nil {
  88. return nil, fmt.Errorf("unabled to marshal json: %w", err)
  89. }
  90. return byteArr, nil
  91. }
  92. func (c *Client) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
  93. return fmt.Errorf("not implemented")
  94. }
  95. // Not Implemented PushSecret.
  96. func (c *Client) PushSecret(_ context.Context, _ []byte, _ esv1beta1.PushRemoteRef) error {
  97. return fmt.Errorf("not implemented")
  98. }
  99. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  100. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  101. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  102. if apierrors.IsNotFound(err) {
  103. return nil, esv1beta1.NoSecretError{}
  104. }
  105. if err != nil {
  106. return nil, err
  107. }
  108. var tmpMap map[string][]byte
  109. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  110. tmpMap, err = getSecretMetadata(secret)
  111. if err != nil {
  112. return nil, err
  113. }
  114. } else {
  115. tmpMap = secret.Data
  116. }
  117. if ref.Property != "" {
  118. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  119. if err != nil {
  120. return nil, err
  121. }
  122. return retMap, nil
  123. }
  124. return tmpMap, nil
  125. }
  126. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  127. byteArr, err := json.Marshal(tmpMap)
  128. if err != nil {
  129. return nil, err
  130. }
  131. var retMap map[string][]byte
  132. jsonStr := string(byteArr)
  133. // We need to search if a given key with a . exists before using gjson operations.
  134. idx := strings.Index(property, ".")
  135. if idx > -1 {
  136. refProperty := strings.ReplaceAll(property, ".", "\\.")
  137. retMap, err = getMapFromValues(refProperty, jsonStr)
  138. if err != nil {
  139. return nil, err
  140. }
  141. if retMap != nil {
  142. return retMap, nil
  143. }
  144. }
  145. retMap, err = getMapFromValues(property, jsonStr)
  146. if err != nil {
  147. return nil, err
  148. }
  149. if retMap == nil {
  150. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  151. }
  152. return retMap, nil
  153. }
  154. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  155. val := gjson.Get(jsonStr, property)
  156. if val.Exists() {
  157. retMap := make(map[string][]byte)
  158. var tmpMap map[string]interface{}
  159. decoded, err := base64.StdEncoding.DecodeString(val.String())
  160. if err != nil {
  161. return nil, err
  162. }
  163. err = json.Unmarshal(decoded, &tmpMap)
  164. if err != nil {
  165. return nil, err
  166. }
  167. for k, v := range tmpMap {
  168. b, err := json.Marshal(v)
  169. if err != nil {
  170. return nil, err
  171. }
  172. retMap[k] = b
  173. }
  174. return retMap, nil
  175. }
  176. return nil, nil
  177. }
  178. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  179. var err error
  180. tmpMap := make(map[string][]byte)
  181. tmpMap[metaLabels], err = json.Marshal(secret.ObjectMeta.Labels)
  182. if err != nil {
  183. return nil, err
  184. }
  185. tmpMap[metaAnnotations], err = json.Marshal(secret.ObjectMeta.Annotations)
  186. if err != nil {
  187. return nil, err
  188. }
  189. return tmpMap, nil
  190. }
  191. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  192. if ref.Tags != nil {
  193. return c.findByTags(ctx, ref)
  194. }
  195. if ref.Name != nil {
  196. return c.findByName(ctx, ref)
  197. }
  198. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  199. }
  200. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  201. // empty/nil tags = everything
  202. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  203. if err != nil {
  204. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  205. }
  206. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  207. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  208. if err != nil {
  209. return nil, fmt.Errorf("unable to list secrets: %w", err)
  210. }
  211. data := make(map[string][]byte)
  212. for _, secret := range secrets.Items {
  213. jsonStr, err := json.Marshal(convertMap(secret.Data))
  214. if err != nil {
  215. return nil, err
  216. }
  217. data[secret.Name] = jsonStr
  218. }
  219. return utils.ConvertKeys(ref.ConversionStrategy, data)
  220. }
  221. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  222. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  223. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  224. if err != nil {
  225. return nil, fmt.Errorf("unable to list secrets: %w", err)
  226. }
  227. matcher, err := find.New(*ref.Name)
  228. if err != nil {
  229. return nil, err
  230. }
  231. data := make(map[string][]byte)
  232. for _, secret := range secrets.Items {
  233. if !matcher.MatchName(secret.Name) {
  234. continue
  235. }
  236. jsonStr, err := json.Marshal(convertMap(secret.Data))
  237. if err != nil {
  238. return nil, err
  239. }
  240. data[secret.Name] = jsonStr
  241. }
  242. return utils.ConvertKeys(ref.ConversionStrategy, data)
  243. }
  244. func (c Client) Close(_ context.Context) error {
  245. return nil
  246. }
  247. func convertMap(in map[string][]byte) map[string]string {
  248. out := make(map[string]string)
  249. for k, v := range in {
  250. out[k] = string(v)
  251. }
  252. return out
  253. }