onepassword.go 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package onepassword
  13. import (
  14. "context"
  15. "errors"
  16. "fmt"
  17. "net/url"
  18. "sort"
  19. "strings"
  20. "time"
  21. "github.com/1Password/connect-sdk-go/connect"
  22. "github.com/1Password/connect-sdk-go/onepassword"
  23. corev1 "k8s.io/api/core/v1"
  24. kclient "sigs.k8s.io/controller-runtime/pkg/client"
  25. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. "github.com/external-secrets/external-secrets/pkg/find"
  28. "github.com/external-secrets/external-secrets/pkg/utils"
  29. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  30. )
  31. const (
  32. userAgent = "external-secrets"
  33. errOnePasswordStore = "received invalid 1Password SecretStore resource: %w"
  34. errOnePasswordStoreNilSpec = "nil spec"
  35. errOnePasswordStoreNilSpecProvider = "nil spec.provider"
  36. errOnePasswordStoreNilSpecProviderOnePassword = "nil spec.provider.onepassword"
  37. errOnePasswordStoreMissingRefName = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.name"
  38. errOnePasswordStoreMissingRefKey = "missing: spec.provider.onepassword.auth.secretRef.connectTokenSecretRef.key"
  39. errOnePasswordStoreAtLeastOneVault = "must be at least one vault: spec.provider.onepassword.vaults"
  40. errOnePasswordStoreInvalidConnectHost = "unable to parse URL: spec.provider.onepassword.connectHost: %w"
  41. errOnePasswordStoreNonUniqueVaultNumbers = "vault order numbers must be unique"
  42. errGetVault = "error finding 1Password Vault: %w"
  43. errGetItem = "error finding 1Password Item: %w"
  44. errUpdateItem = "error updating 1Password Item: %w"
  45. errDocumentNotFound = "error finding 1Password Document: %w"
  46. errTagsNotImplemented = "'find.tags' is not implemented in the 1Password provider"
  47. errVersionNotImplemented = "'remoteRef.version' is not implemented in the 1Password provider"
  48. errCreateItem = "error creating 1Password Item: %w"
  49. errDeleteItem = "error deleting 1Password Item: %w"
  50. // custom error messages.
  51. errKeyNotFoundMsg = "key not found in 1Password Vaults"
  52. errNoVaultsMsg = "no vaults found"
  53. errExpectedOneItemMsg = "expected one 1Password Item matching"
  54. errExpectedOneFieldMsg = "expected one 1Password ItemField matching"
  55. errExpectedOneFieldMsgF = "%w: '%s' in '%s', got %d"
  56. documentCategory = "DOCUMENT"
  57. fieldPrefix = "field"
  58. filePrefix = "file"
  59. prefixSplitter = "/"
  60. )
  61. // Custom Errors //.
  62. var (
  63. // ErrKeyNotFound is returned when a key is not found in the 1Password Vaults.
  64. ErrKeyNotFound = errors.New(errKeyNotFoundMsg)
  65. // ErrNoVaults is returned when no vaults are found in the 1Password provider.
  66. ErrNoVaults = errors.New(errNoVaultsMsg)
  67. // ErrExpectedOneField is returned when more than 1 field is found in the 1Password Vaults.
  68. ErrExpectedOneField = errors.New(errExpectedOneFieldMsg)
  69. // ErrExpectedOneItem is returned when more than 1 item is found in the 1Password Vaults.
  70. ErrExpectedOneItem = errors.New(errExpectedOneItemMsg)
  71. )
  72. // ProviderOnePassword is a provider for 1Password.
  73. type ProviderOnePassword struct {
  74. vaults map[string]int
  75. client connect.Client
  76. }
  77. // https://github.com/external-secrets/external-secrets/issues/644
  78. var (
  79. _ esv1beta1.SecretsClient = &ProviderOnePassword{}
  80. _ esv1beta1.Provider = &ProviderOnePassword{}
  81. )
  82. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  83. func (provider *ProviderOnePassword) Capabilities() esv1beta1.SecretStoreCapabilities {
  84. return esv1beta1.SecretStoreReadOnly
  85. }
  86. // NewClient constructs a 1Password Provider.
  87. func (provider *ProviderOnePassword) NewClient(ctx context.Context, store esv1beta1.GenericStore, kube kclient.Client, namespace string) (esv1beta1.SecretsClient, error) {
  88. config := store.GetSpec().Provider.OnePassword
  89. token, err := resolvers.SecretKeyRef(
  90. ctx,
  91. kube,
  92. store.GetKind(),
  93. namespace,
  94. &config.Auth.SecretRef.ConnectToken,
  95. )
  96. if err != nil {
  97. return nil, err
  98. }
  99. provider.client = connect.NewClientWithUserAgent(config.ConnectHost, token, userAgent)
  100. provider.vaults = config.Vaults
  101. return provider, nil
  102. }
  103. // ValidateStore checks if the provided store is valid.
  104. func (provider *ProviderOnePassword) ValidateStore(store esv1beta1.GenericStore) (admission.Warnings, error) {
  105. return nil, validateStore(store)
  106. }
  107. func validateStore(store esv1beta1.GenericStore) error {
  108. // check nils
  109. storeSpec := store.GetSpec()
  110. if storeSpec == nil {
  111. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreNilSpec))
  112. }
  113. if storeSpec.Provider == nil {
  114. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreNilSpecProvider))
  115. }
  116. if storeSpec.Provider.OnePassword == nil {
  117. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreNilSpecProviderOnePassword))
  118. }
  119. // check mandatory fields
  120. config := storeSpec.Provider.OnePassword
  121. if config.Auth.SecretRef.ConnectToken.Name == "" {
  122. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreMissingRefName))
  123. }
  124. if config.Auth.SecretRef.ConnectToken.Key == "" {
  125. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreMissingRefKey))
  126. }
  127. // check namespace compared to kind
  128. if err := utils.ValidateSecretSelector(store, config.Auth.SecretRef.ConnectToken); err != nil {
  129. return fmt.Errorf(errOnePasswordStore, err)
  130. }
  131. // check at least one vault
  132. if len(config.Vaults) == 0 {
  133. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreAtLeastOneVault))
  134. }
  135. // ensure vault numbers are unique
  136. if !hasUniqueVaultNumbers(config.Vaults) {
  137. return fmt.Errorf(errOnePasswordStore, errors.New(errOnePasswordStoreNonUniqueVaultNumbers))
  138. }
  139. // check valid URL
  140. if _, err := url.Parse(config.ConnectHost); err != nil {
  141. return fmt.Errorf(errOnePasswordStore, fmt.Errorf(errOnePasswordStoreInvalidConnectHost, err))
  142. }
  143. return nil
  144. }
  145. func deleteField(fields []*onepassword.ItemField, label string) ([]*onepassword.ItemField, error) {
  146. // This will always iterate over all items
  147. // but its done to ensure that two fields with the same label
  148. // exist resulting in undefined behavior
  149. var (
  150. found bool
  151. fieldsF = make([]*onepassword.ItemField, 0, len(fields))
  152. )
  153. for _, item := range fields {
  154. if item.Label == label {
  155. if found {
  156. return nil, ErrExpectedOneField
  157. }
  158. found = true
  159. continue
  160. }
  161. fieldsF = append(fieldsF, item)
  162. }
  163. return fieldsF, nil
  164. }
  165. func (provider *ProviderOnePassword) DeleteSecret(_ context.Context, ref esv1beta1.PushSecretRemoteRef) error {
  166. providerItem, err := provider.findItem(ref.GetRemoteKey())
  167. if err != nil {
  168. return err
  169. }
  170. providerItem.Fields, err = deleteField(providerItem.Fields, ref.GetProperty())
  171. if err != nil {
  172. return fmt.Errorf(errUpdateItem, err)
  173. }
  174. if len(providerItem.Fields) == 0 && len(providerItem.Files) == 0 && len(providerItem.Sections) == 0 {
  175. // Delete the item if there are no fields, files or sections
  176. if err = provider.client.DeleteItem(providerItem, providerItem.Vault.ID); err != nil {
  177. return fmt.Errorf(errDeleteItem, err)
  178. }
  179. return nil
  180. }
  181. if _, err = provider.client.UpdateItem(providerItem, providerItem.Vault.ID); err != nil {
  182. return fmt.Errorf(errDeleteItem, err)
  183. }
  184. return nil
  185. }
  186. func (provider *ProviderOnePassword) SecretExists(_ context.Context, _ esv1beta1.PushSecretRemoteRef) (bool, error) {
  187. return false, errors.New("not implemented")
  188. }
  189. const (
  190. passwordLabel = "password"
  191. )
  192. // createItem creates a new item in the first vault. If no vaults exist, it returns an error.
  193. func (provider *ProviderOnePassword) createItem(val []byte, ref esv1beta1.PushSecretData) error {
  194. // Get the first vault
  195. sortedVaults := sortVaults(provider.vaults)
  196. if len(sortedVaults) == 0 {
  197. return ErrNoVaults
  198. }
  199. vaultID := sortedVaults[0]
  200. // Get the label
  201. label := ref.GetProperty()
  202. if label == "" {
  203. label = passwordLabel
  204. }
  205. // Create the item
  206. item := &onepassword.Item{
  207. Title: ref.GetRemoteKey(),
  208. Category: onepassword.Server,
  209. Vault: onepassword.ItemVault{
  210. ID: vaultID,
  211. },
  212. Fields: []*onepassword.ItemField{
  213. generateNewItemField(label, string(val)),
  214. },
  215. }
  216. _, err := provider.client.CreateItem(item, vaultID)
  217. return err
  218. }
  219. // updateFieldValue updates the fields value of an item with the given label.
  220. // If the label does not exist, a new field is created. If the label exists but
  221. // the value is different, the value is updated. If the label exists and the
  222. // value is the same, nothing is done.
  223. func updateFieldValue(fields []*onepassword.ItemField, label, newVal string) ([]*onepassword.ItemField, error) {
  224. // This will always iterate over all items.
  225. // This is done to ensure that two fields with the same label
  226. // exist resulting in undefined behavior.
  227. var (
  228. found bool
  229. index int
  230. )
  231. for i, item := range fields {
  232. if item.Label == label {
  233. if found {
  234. return nil, ErrExpectedOneField
  235. }
  236. found = true
  237. index = i
  238. }
  239. }
  240. if !found {
  241. return append(fields, generateNewItemField(label, newVal)), nil
  242. }
  243. if fields[index].Value != newVal {
  244. fields[index].Value = newVal
  245. }
  246. return fields, nil
  247. }
  248. // generateNewItemField generates a new item field with the given label and value.
  249. func generateNewItemField(label, newVal string) *onepassword.ItemField {
  250. field := &onepassword.ItemField{
  251. Label: label,
  252. Value: newVal,
  253. Type: onepassword.FieldTypeConcealed,
  254. }
  255. return field
  256. }
  257. func (provider *ProviderOnePassword) PushSecret(ctx context.Context, secret *corev1.Secret, ref esv1beta1.PushSecretData) error {
  258. val, ok := secret.Data[ref.GetSecretKey()]
  259. if !ok {
  260. return ErrKeyNotFound
  261. }
  262. title := ref.GetRemoteKey()
  263. providerItem, err := provider.findItem(title)
  264. if errors.Is(err, ErrKeyNotFound) {
  265. if err = provider.createItem(val, ref); err != nil {
  266. return fmt.Errorf(errCreateItem, err)
  267. }
  268. err = provider.waitForFunc(ctx, provider.waitForItemToExist(title))
  269. return err
  270. } else if err != nil {
  271. return err
  272. }
  273. label := ref.GetProperty()
  274. if label == "" {
  275. label = passwordLabel
  276. }
  277. providerItem.Fields, err = updateFieldValue(providerItem.Fields, label, string(val))
  278. if err != nil {
  279. return fmt.Errorf(errUpdateItem, err)
  280. }
  281. if _, err = provider.client.UpdateItem(providerItem, providerItem.Vault.ID); err != nil {
  282. return fmt.Errorf(errUpdateItem, err)
  283. }
  284. if err := provider.waitForFunc(ctx, provider.waitForLabelToBeUpdated(title, label, val)); err != nil {
  285. return fmt.Errorf("failed waiting for label update: %w", err)
  286. }
  287. return nil
  288. }
  289. // Clean property string by removing property prefix if needed.
  290. func getObjType(documentType onepassword.ItemCategory, property string) (string, string) {
  291. if strings.HasPrefix(property, fieldPrefix+prefixSplitter) {
  292. return fieldPrefix, property[6:]
  293. }
  294. if strings.HasPrefix(property, filePrefix+prefixSplitter) {
  295. return filePrefix, property[5:]
  296. }
  297. if documentType == documentCategory {
  298. return filePrefix, property
  299. }
  300. return fieldPrefix, property
  301. }
  302. // GetSecret returns a single secret from the provider.
  303. func (provider *ProviderOnePassword) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  304. if ref.Version != "" {
  305. return nil, errors.New(errVersionNotImplemented)
  306. }
  307. item, err := provider.findItem(ref.Key)
  308. if err != nil {
  309. return nil, err
  310. }
  311. propertyType, property := getObjType(item.Category, ref.Property)
  312. if propertyType == filePrefix {
  313. return provider.getFile(item, property)
  314. }
  315. return provider.getField(item, property)
  316. }
  317. // Validate checks if the client is configured correctly
  318. // to be able to retrieve secrets from the provider.
  319. func (provider *ProviderOnePassword) Validate() (esv1beta1.ValidationResult, error) {
  320. for vaultName := range provider.vaults {
  321. _, err := provider.client.GetVaultByTitle(vaultName)
  322. if err != nil {
  323. return esv1beta1.ValidationResultError, err
  324. }
  325. }
  326. return esv1beta1.ValidationResultReady, nil
  327. }
  328. // GetSecretMap returns multiple k/v pairs from the provider, for dataFrom.extract.
  329. func (provider *ProviderOnePassword) GetSecretMap(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  330. if ref.Version != "" {
  331. return nil, errors.New(errVersionNotImplemented)
  332. }
  333. item, err := provider.findItem(ref.Key)
  334. if err != nil {
  335. return nil, err
  336. }
  337. propertyType, property := getObjType(item.Category, ref.Property)
  338. if propertyType == filePrefix {
  339. return provider.getFiles(item, property)
  340. }
  341. return provider.getFields(item, property)
  342. }
  343. // GetAllSecrets syncs multiple 1Password Items into a single Kubernetes Secret, for dataFrom.find.
  344. func (provider *ProviderOnePassword) GetAllSecrets(_ context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  345. if ref.Tags != nil {
  346. return nil, errors.New(errTagsNotImplemented)
  347. }
  348. secretData := make(map[string][]byte)
  349. sortedVaults := sortVaults(provider.vaults)
  350. for _, vaultName := range sortedVaults {
  351. vault, err := provider.client.GetVaultByTitle(vaultName)
  352. if err != nil {
  353. return nil, fmt.Errorf(errGetVault, err)
  354. }
  355. err = provider.getAllForVault(vault.ID, ref, secretData)
  356. if err != nil {
  357. return nil, err
  358. }
  359. }
  360. return secretData, nil
  361. }
  362. // Close closes the client connection.
  363. func (provider *ProviderOnePassword) Close(_ context.Context) error {
  364. return nil
  365. }
  366. func (provider *ProviderOnePassword) findItem(name string) (*onepassword.Item, error) {
  367. sortedVaults := sortVaults(provider.vaults)
  368. for _, vaultName := range sortedVaults {
  369. vault, err := provider.client.GetVaultByTitle(vaultName)
  370. if err != nil {
  371. return nil, fmt.Errorf(errGetVault, err)
  372. }
  373. // use GetItemsByTitle instead of GetItemByTitle in order to handle length cases
  374. items, err := provider.client.GetItemsByTitle(name, vault.ID)
  375. if err != nil {
  376. return nil, fmt.Errorf(errGetItem, err)
  377. }
  378. switch {
  379. case len(items) == 1:
  380. return provider.client.GetItemByUUID(items[0].ID, items[0].Vault.ID)
  381. case len(items) > 1:
  382. return nil, fmt.Errorf("%w: '%s', got %d", ErrExpectedOneItem, name, len(items))
  383. }
  384. }
  385. return nil, fmt.Errorf("%w: %s in: %v", ErrKeyNotFound, name, provider.vaults)
  386. }
  387. func (provider *ProviderOnePassword) getField(item *onepassword.Item, property string) ([]byte, error) {
  388. // default to a field labeled "password"
  389. fieldLabel := "password"
  390. if property != "" {
  391. fieldLabel = property
  392. }
  393. if length := countFieldsWithLabel(fieldLabel, item.Fields); length != 1 {
  394. return nil, fmt.Errorf("%w: '%s' in '%s', got %d", ErrExpectedOneField, fieldLabel, item.Title, length)
  395. }
  396. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  397. value := ""
  398. for _, field := range item.Fields {
  399. if field.Label == fieldLabel {
  400. value = field.Value
  401. break
  402. }
  403. }
  404. return []byte(value), nil
  405. }
  406. func (provider *ProviderOnePassword) getFields(item *onepassword.Item, property string) (map[string][]byte, error) {
  407. secretData := make(map[string][]byte)
  408. for _, field := range item.Fields {
  409. if property != "" && field.Label != property {
  410. continue
  411. }
  412. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  413. return nil, fmt.Errorf(errExpectedOneFieldMsgF, ErrExpectedOneField, field.Label, item.Title, length)
  414. }
  415. // caution: do not use client.GetValue here because it has undesirable behavior on keys with a dot in them
  416. secretData[field.Label] = []byte(field.Value)
  417. }
  418. return secretData, nil
  419. }
  420. func (provider *ProviderOnePassword) getAllFields(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  421. i, err := provider.client.GetItemByUUID(item.ID, item.Vault.ID)
  422. if err != nil {
  423. return fmt.Errorf(errGetItem, err)
  424. }
  425. item = *i
  426. for _, field := range item.Fields {
  427. if length := countFieldsWithLabel(field.Label, item.Fields); length != 1 {
  428. return fmt.Errorf(errExpectedOneFieldMsgF, ErrExpectedOneField, field.Label, item.Title, length)
  429. }
  430. if ref.Name != nil {
  431. matcher, err := find.New(*ref.Name)
  432. if err != nil {
  433. return err
  434. }
  435. if !matcher.MatchName(field.Label) {
  436. continue
  437. }
  438. }
  439. if _, ok := secretData[field.Label]; !ok {
  440. secretData[field.Label] = []byte(field.Value)
  441. }
  442. }
  443. return nil
  444. }
  445. func (provider *ProviderOnePassword) getFile(item *onepassword.Item, property string) ([]byte, error) {
  446. for _, file := range item.Files {
  447. // default to the first file when ref.Property is empty
  448. if file.Name == property || property == "" {
  449. contents, err := provider.client.GetFileContent(file)
  450. if err != nil {
  451. return nil, err
  452. }
  453. return contents, nil
  454. }
  455. }
  456. return nil, fmt.Errorf(errDocumentNotFound, fmt.Errorf("'%s', '%s'", item.Title, property))
  457. }
  458. func (provider *ProviderOnePassword) getFiles(item *onepassword.Item, property string) (map[string][]byte, error) {
  459. secretData := make(map[string][]byte)
  460. for _, file := range item.Files {
  461. if property != "" && file.Name != property {
  462. continue
  463. }
  464. contents, err := provider.client.GetFileContent(file)
  465. if err != nil {
  466. return nil, err
  467. }
  468. secretData[file.Name] = contents
  469. }
  470. return secretData, nil
  471. }
  472. func (provider *ProviderOnePassword) getAllFiles(item onepassword.Item, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  473. for _, file := range item.Files {
  474. if ref.Name != nil {
  475. matcher, err := find.New(*ref.Name)
  476. if err != nil {
  477. return err
  478. }
  479. if !matcher.MatchName(file.Name) {
  480. continue
  481. }
  482. }
  483. if _, ok := secretData[file.Name]; !ok {
  484. contents, err := provider.client.GetFileContent(file)
  485. if err != nil {
  486. return err
  487. }
  488. secretData[file.Name] = contents
  489. }
  490. }
  491. return nil
  492. }
  493. func (provider *ProviderOnePassword) getAllForVault(vaultID string, ref esv1beta1.ExternalSecretFind, secretData map[string][]byte) error {
  494. items, err := provider.client.GetItems(vaultID)
  495. if err != nil {
  496. return fmt.Errorf(errGetItem, err)
  497. }
  498. for _, item := range items {
  499. if ref.Path != nil && *ref.Path != item.Title {
  500. continue
  501. }
  502. // handle files
  503. err = provider.getAllFiles(item, ref, secretData)
  504. if err != nil {
  505. return err
  506. }
  507. // handle fields
  508. err = provider.getAllFields(item, ref, secretData)
  509. if err != nil {
  510. return err
  511. }
  512. }
  513. return nil
  514. }
  515. // waitForFunc will wait for OnePassword to _actually_ create/update the secret. OnePassword returns immediately after
  516. // the initial create/update which makes the next call for the same item create/update a new item with the same name. Hence, we'll
  517. // wait for the item to exist or be updated on OnePassword's side as well.
  518. // Ideally we could do bulk operations and handle data with one submit, but that would require re-writing the entire
  519. // push secret controller. For now, this is sufficient.
  520. func (provider *ProviderOnePassword) waitForFunc(ctx context.Context, fn func() error) error {
  521. // check every .5 seconds
  522. tick := time.NewTicker(500 * time.Millisecond)
  523. defer tick.Stop()
  524. done, cancel := context.WithTimeout(ctx, 5*time.Second)
  525. defer cancel()
  526. var err error
  527. for {
  528. select {
  529. case <-tick.C:
  530. if err = fn(); err == nil {
  531. return nil
  532. }
  533. case <-done.Done():
  534. return fmt.Errorf("timeout to wait for function to run successfully; last error was: %w", err)
  535. }
  536. }
  537. }
  538. func (provider *ProviderOnePassword) waitForItemToExist(title string) func() error {
  539. return func() error {
  540. _, err := provider.findItem(title)
  541. return err
  542. }
  543. }
  544. func (provider *ProviderOnePassword) waitForLabelToBeUpdated(title, label string, val []byte) func() error {
  545. return func() error {
  546. item, err := provider.findItem(title)
  547. if err != nil {
  548. return err
  549. }
  550. for _, field := range item.Fields {
  551. // we found the label with the right value
  552. if field.Label == label && field.Value == string(val) {
  553. return nil
  554. }
  555. }
  556. return fmt.Errorf("label %s no found on value with title %s", title, label)
  557. }
  558. }
  559. func countFieldsWithLabel(fieldLabel string, fields []*onepassword.ItemField) int {
  560. count := 0
  561. for _, field := range fields {
  562. if field.Label == fieldLabel {
  563. count++
  564. }
  565. }
  566. return count
  567. }
  568. type orderedVault struct {
  569. Name string
  570. Order int
  571. }
  572. type orderedVaultList []orderedVault
  573. func (list orderedVaultList) Len() int { return len(list) }
  574. func (list orderedVaultList) Swap(i, j int) { list[i], list[j] = list[j], list[i] }
  575. func (list orderedVaultList) Less(i, j int) bool { return list[i].Order < list[j].Order }
  576. func sortVaults(vaults map[string]int) []string {
  577. list := make(orderedVaultList, len(vaults))
  578. index := 0
  579. for key, value := range vaults {
  580. list[index] = orderedVault{key, value}
  581. index++
  582. }
  583. sort.Sort(list)
  584. sortedVaults := []string{}
  585. for _, item := range list {
  586. sortedVaults = append(sortedVaults, item.Name)
  587. }
  588. return sortedVaults
  589. }
  590. func hasUniqueVaultNumbers(vaults map[string]int) bool {
  591. unique := make([]int, 0, len(vaults))
  592. tracker := make(map[int]bool)
  593. for _, number := range vaults {
  594. if _, ok := tracker[number]; !ok {
  595. tracker[number] = true
  596. unique = append(unique, number)
  597. }
  598. }
  599. return len(vaults) == len(unique)
  600. }
  601. func init() {
  602. esv1beta1.Register(&ProviderOnePassword{}, &esv1beta1.SecretStoreProvider{
  603. OnePassword: &esv1beta1.OnePasswordProvider{},
  604. })
  605. }