utils.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package utils
  13. import (
  14. "bytes"
  15. "context"
  16. "crypto/md5" //nolint:gosec
  17. "crypto/x509"
  18. "encoding/base64"
  19. "encoding/json"
  20. "encoding/pem"
  21. "errors"
  22. "fmt"
  23. "net"
  24. "net/url"
  25. "reflect"
  26. "regexp"
  27. "strconv"
  28. "strings"
  29. tpl "text/template"
  30. "time"
  31. "unicode"
  32. corev1 "k8s.io/api/core/v1"
  33. apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  34. "sigs.k8s.io/controller-runtime/pkg/client"
  35. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  36. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  37. esmeta "github.com/external-secrets/external-secrets/apis/meta/v1"
  38. "github.com/external-secrets/external-secrets/pkg/template/v2"
  39. "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
  40. )
  41. const (
  42. errParse = "unable to parse transform template: %s"
  43. errExecute = "unable to execute transform template: %s"
  44. )
  45. var (
  46. errKeyNotFound = errors.New("key not found")
  47. unicodeRegex = regexp.MustCompile(`_U([0-9a-fA-F]{4,5})_`)
  48. )
  49. // JSONMarshal takes an interface and returns a new escaped and encoded byte slice.
  50. func JSONMarshal(t any) ([]byte, error) {
  51. buffer := &bytes.Buffer{}
  52. encoder := json.NewEncoder(buffer)
  53. encoder.SetEscapeHTML(false)
  54. err := encoder.Encode(t)
  55. return bytes.TrimRight(buffer.Bytes(), "\n"), err
  56. }
  57. // MergeByteMap merges map of byte slices.
  58. func MergeByteMap(dst, src map[string][]byte) map[string][]byte {
  59. for k, v := range src {
  60. dst[k] = v
  61. }
  62. return dst
  63. }
  64. func RewriteMap(operations []esv1beta1.ExternalSecretRewrite, in map[string][]byte) (map[string][]byte, error) {
  65. out := in
  66. var err error
  67. for i, op := range operations {
  68. if op.Regexp != nil {
  69. out, err = RewriteRegexp(*op.Regexp, out)
  70. if err != nil {
  71. return nil, fmt.Errorf("failed rewriting regexp operation[%v]: %w", i, err)
  72. }
  73. }
  74. if op.Transform != nil {
  75. out, err = RewriteTransform(*op.Transform, out)
  76. if err != nil {
  77. return nil, fmt.Errorf("failed rewriting transform operation[%v]: %w", i, err)
  78. }
  79. }
  80. }
  81. return out, nil
  82. }
  83. // RewriteRegexp rewrites a single Regexp Rewrite Operation.
  84. func RewriteRegexp(operation esv1beta1.ExternalSecretRewriteRegexp, in map[string][]byte) (map[string][]byte, error) {
  85. out := make(map[string][]byte)
  86. re, err := regexp.Compile(operation.Source)
  87. if err != nil {
  88. return nil, err
  89. }
  90. for key, value := range in {
  91. newKey := re.ReplaceAllString(key, operation.Target)
  92. out[newKey] = value
  93. }
  94. return out, nil
  95. }
  96. // RewriteTransform applies string transformation on each secret key name to rewrite.
  97. func RewriteTransform(operation esv1beta1.ExternalSecretRewriteTransform, in map[string][]byte) (map[string][]byte, error) {
  98. out := make(map[string][]byte)
  99. for key, value := range in {
  100. data := map[string][]byte{
  101. "value": []byte(key),
  102. }
  103. result, err := transform(operation.Template, data)
  104. if err != nil {
  105. return nil, err
  106. }
  107. newKey := string(result)
  108. out[newKey] = value
  109. }
  110. return out, nil
  111. }
  112. func transform(val string, data map[string][]byte) ([]byte, error) {
  113. strValData := make(map[string]string, len(data))
  114. for k := range data {
  115. strValData[k] = string(data[k])
  116. }
  117. t, err := tpl.New("transform").
  118. Funcs(template.FuncMap()).
  119. Parse(val)
  120. if err != nil {
  121. return nil, fmt.Errorf(errParse, err)
  122. }
  123. buf := bytes.NewBuffer(nil)
  124. err = t.Execute(buf, strValData)
  125. if err != nil {
  126. return nil, fmt.Errorf(errExecute, err)
  127. }
  128. return buf.Bytes(), nil
  129. }
  130. // DecodeMap decodes values from a secretMap.
  131. func DecodeMap(strategy esv1beta1.ExternalSecretDecodingStrategy, in map[string][]byte) (map[string][]byte, error) {
  132. out := make(map[string][]byte, len(in))
  133. for k, v := range in {
  134. val, err := Decode(strategy, v)
  135. if err != nil {
  136. return nil, fmt.Errorf("failure decoding key %v: %w", k, err)
  137. }
  138. out[k] = val
  139. }
  140. return out, nil
  141. }
  142. func Decode(strategy esv1beta1.ExternalSecretDecodingStrategy, in []byte) ([]byte, error) {
  143. switch strategy {
  144. case esv1beta1.ExternalSecretDecodeBase64:
  145. out, err := base64.StdEncoding.DecodeString(string(in))
  146. if err != nil {
  147. return nil, err
  148. }
  149. return out, nil
  150. case esv1beta1.ExternalSecretDecodeBase64URL:
  151. out, err := base64.URLEncoding.DecodeString(string(in))
  152. if err != nil {
  153. return nil, err
  154. }
  155. return out, nil
  156. case esv1beta1.ExternalSecretDecodeNone:
  157. return in, nil
  158. // default when stored version is v1alpha1
  159. case "":
  160. return in, nil
  161. case esv1beta1.ExternalSecretDecodeAuto:
  162. out, err := Decode(esv1beta1.ExternalSecretDecodeBase64, in)
  163. if err != nil {
  164. out, err := Decode(esv1beta1.ExternalSecretDecodeBase64URL, in)
  165. if err != nil {
  166. return Decode(esv1beta1.ExternalSecretDecodeNone, in)
  167. }
  168. return out, nil
  169. }
  170. return out, nil
  171. default:
  172. return nil, fmt.Errorf("decoding strategy %v is not supported", strategy)
  173. }
  174. }
  175. // ValidateKeys checks if the keys in the secret map are valid keys for a Kubernetes secret.
  176. func ValidateKeys(in map[string][]byte) error {
  177. for key := range in {
  178. keyLength := len(key)
  179. if keyLength == 0 {
  180. return fmt.Errorf("found empty key")
  181. }
  182. if keyLength > 253 {
  183. return fmt.Errorf("key has length %d but max is 253: (following is truncated): %s", keyLength, key[:253])
  184. }
  185. for _, c := range key {
  186. if !unicode.IsLetter(c) && !unicode.IsNumber(c) && c != '-' && c != '.' && c != '_' {
  187. return fmt.Errorf("key has invalid character %c, only alphanumeric, '-', '.' and '_' are allowed: %s", c, key)
  188. }
  189. }
  190. }
  191. return nil
  192. }
  193. // ConvertKeys converts a secret map into a valid key.
  194. // Replaces any non-alphanumeric characters depending on convert strategy.
  195. func ConvertKeys(strategy esv1beta1.ExternalSecretConversionStrategy, in map[string][]byte) (map[string][]byte, error) {
  196. out := make(map[string][]byte, len(in))
  197. for k, v := range in {
  198. key := convert(strategy, k)
  199. if _, exists := out[key]; exists {
  200. return nil, fmt.Errorf("secret name collision during conversion: %s", key)
  201. }
  202. out[key] = v
  203. }
  204. return out, nil
  205. }
  206. func convert(strategy esv1beta1.ExternalSecretConversionStrategy, str string) string {
  207. rs := []rune(str)
  208. newName := make([]string, len(rs))
  209. for rk, rv := range rs {
  210. if !unicode.IsNumber(rv) &&
  211. !unicode.IsLetter(rv) &&
  212. rv != '-' &&
  213. rv != '.' &&
  214. rv != '_' {
  215. switch strategy {
  216. case esv1beta1.ExternalSecretConversionDefault:
  217. newName[rk] = "_"
  218. case esv1beta1.ExternalSecretConversionUnicode:
  219. newName[rk] = fmt.Sprintf("_U%04x_", rv)
  220. default:
  221. newName[rk] = string(rv)
  222. }
  223. } else {
  224. newName[rk] = string(rv)
  225. }
  226. }
  227. return strings.Join(newName, "")
  228. }
  229. // ReverseKeys reverses a secret map into a valid key map as expected by push secrets.
  230. // Replaces the unicode encoded representation characters back to the actual unicode character depending on convert strategy.
  231. func ReverseKeys(strategy esv1alpha1.PushSecretConversionStrategy, in map[string][]byte) (map[string][]byte, error) {
  232. out := make(map[string][]byte, len(in))
  233. for k, v := range in {
  234. key := reverse(strategy, k)
  235. if _, exists := out[key]; exists {
  236. return nil, fmt.Errorf("secret name collision during conversion: %s", key)
  237. }
  238. out[key] = v
  239. }
  240. return out, nil
  241. }
  242. func reverse(strategy esv1alpha1.PushSecretConversionStrategy, str string) string {
  243. switch strategy {
  244. case esv1alpha1.PushSecretConversionReverseUnicode:
  245. matches := unicodeRegex.FindAllStringSubmatchIndex(str, -1)
  246. for i := len(matches) - 1; i >= 0; i-- {
  247. match := matches[i]
  248. start := match[0]
  249. end := match[1]
  250. unicodeHex := str[match[2]:match[3]]
  251. unicodeInt, err := strconv.ParseInt(unicodeHex, 16, 32)
  252. if err != nil {
  253. continue // Skip invalid unicode representations
  254. }
  255. unicodeChar := fmt.Sprintf("%c", unicodeInt)
  256. str = str[:start] + unicodeChar + str[end:]
  257. }
  258. return str
  259. case esv1alpha1.PushSecretConversionNone:
  260. return str
  261. default:
  262. return str
  263. }
  264. }
  265. // MergeStringMap performs a deep clone from src to dest.
  266. func MergeStringMap(dest, src map[string]string) {
  267. for k, v := range src {
  268. dest[k] = v
  269. }
  270. }
  271. var (
  272. ErrUnexpectedKey = errors.New("unexpected key in data")
  273. ErrSecretType = errors.New("can not handle secret value with type")
  274. )
  275. func GetByteValueFromMap(data map[string]any, key string) ([]byte, error) {
  276. v, ok := data[key]
  277. if !ok {
  278. return nil, fmt.Errorf("%w: %s", ErrUnexpectedKey, key)
  279. }
  280. return GetByteValue(v)
  281. }
  282. func GetByteValue(v any) ([]byte, error) {
  283. switch t := v.(type) {
  284. case string:
  285. return []byte(t), nil
  286. case map[string]any:
  287. return json.Marshal(t)
  288. case []string:
  289. return []byte(strings.Join(t, "\n")), nil
  290. case json.RawMessage:
  291. return t, nil
  292. case []byte:
  293. return t, nil
  294. // also covers int and float32 due to json.Marshal
  295. case float64:
  296. return []byte(strconv.FormatFloat(t, 'f', -1, 64)), nil
  297. case json.Number:
  298. return []byte(t.String()), nil
  299. case []any:
  300. return json.Marshal(t)
  301. case bool:
  302. return []byte(strconv.FormatBool(t)), nil
  303. case nil:
  304. return []byte(nil), nil
  305. default:
  306. return nil, fmt.Errorf("%w: %T", ErrSecretType, t)
  307. }
  308. }
  309. // IsNil checks if an Interface is nil.
  310. func IsNil(i any) bool {
  311. if i == nil {
  312. return true
  313. }
  314. value := reflect.ValueOf(i)
  315. if value.Type().Kind() == reflect.Ptr {
  316. return value.IsNil()
  317. }
  318. return false
  319. }
  320. // ObjectHash calculates md5 sum of the data contained in the secret.
  321. //
  322. //nolint:gosec
  323. func ObjectHash(object any) string {
  324. textualVersion := fmt.Sprintf("%+v", object)
  325. return fmt.Sprintf("%x", md5.Sum([]byte(textualVersion)))
  326. }
  327. func ErrorContains(out error, want string) bool {
  328. if out == nil {
  329. return want == ""
  330. }
  331. if want == "" {
  332. return false
  333. }
  334. return strings.Contains(out.Error(), want)
  335. }
  336. var (
  337. errNamespaceNotAllowed = errors.New("namespace should either be empty or match the namespace of the SecretStore for a namespaced SecretStore")
  338. errRequireNamespace = errors.New("cluster scope requires namespace")
  339. )
  340. // ValidateSecretSelector just checks if the namespace field is present/absent
  341. // depending on the secret store type.
  342. // We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
  343. func ValidateSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
  344. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  345. if clusterScope && ref.Namespace == nil {
  346. return errRequireNamespace
  347. }
  348. if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
  349. return errNamespaceNotAllowed
  350. }
  351. return nil
  352. }
  353. // ValidateReferentSecretSelector allows
  354. // cluster scoped store without namespace
  355. // this should replace above ValidateServiceAccountSelector once all providers
  356. // support referent auth.
  357. func ValidateReferentSecretSelector(store esv1beta1.GenericStore, ref esmeta.SecretKeySelector) error {
  358. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  359. if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
  360. return errNamespaceNotAllowed
  361. }
  362. return nil
  363. }
  364. // ValidateServiceAccountSelector just checks if the namespace field is present/absent
  365. // depending on the secret store type.
  366. // We MUST NOT check the name or key property here. It MAY be defaulted by the provider.
  367. func ValidateServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
  368. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  369. if clusterScope && ref.Namespace == nil {
  370. return errRequireNamespace
  371. }
  372. if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
  373. return errNamespaceNotAllowed
  374. }
  375. return nil
  376. }
  377. // ValidateReferentServiceAccountSelector allows
  378. // cluster scoped store without namespace
  379. // this should replace above ValidateServiceAccountSelector once all providers
  380. // support referent auth.
  381. func ValidateReferentServiceAccountSelector(store esv1beta1.GenericStore, ref esmeta.ServiceAccountSelector) error {
  382. clusterScope := store.GetObjectKind().GroupVersionKind().Kind == esv1beta1.ClusterSecretStoreKind
  383. if !clusterScope && ref.Namespace != nil && *ref.Namespace != store.GetNamespace() {
  384. return errNamespaceNotAllowed
  385. }
  386. return nil
  387. }
  388. func NetworkValidate(endpoint string, timeout time.Duration) error {
  389. hostname, err := url.Parse(endpoint)
  390. if err != nil {
  391. return fmt.Errorf("could not parse url: %w", err)
  392. }
  393. host := hostname.Hostname()
  394. port := hostname.Port()
  395. if port == "" {
  396. port = "443"
  397. }
  398. url := fmt.Sprintf("%v:%v", host, port)
  399. conn, err := net.DialTimeout("tcp", url, timeout)
  400. if err != nil {
  401. return fmt.Errorf("error accessing external store: %w", err)
  402. }
  403. defer conn.Close()
  404. return nil
  405. }
  406. func Deref[V any](v *V) V {
  407. if v == nil {
  408. // Create zero value
  409. var res V
  410. return res
  411. }
  412. return *v
  413. }
  414. func Ptr[T any](i T) *T {
  415. return &i
  416. }
  417. func ConvertToType[T any](obj any) (T, error) {
  418. var v T
  419. data, err := json.Marshal(obj)
  420. if err != nil {
  421. return v, fmt.Errorf("failed to marshal object: %w", err)
  422. }
  423. if err = json.Unmarshal(data, &v); err != nil {
  424. return v, fmt.Errorf("failed to unmarshal object: %w", err)
  425. }
  426. return v, nil
  427. }
  428. // FetchValueFromMetadata fetches a key from a metadata if it exists. It will recursively look in
  429. // embedded values as well. Must be a unique key, otherwise it will just return the first
  430. // occurrence.
  431. func FetchValueFromMetadata[T any](key string, data *apiextensionsv1.JSON, def T) (t T, _ error) {
  432. if data == nil {
  433. return def, nil
  434. }
  435. m := map[string]any{}
  436. if err := json.Unmarshal(data.Raw, &m); err != nil {
  437. return t, fmt.Errorf("failed to parse JSON raw data: %w", err)
  438. }
  439. v, err := dig[T](key, m)
  440. if err != nil {
  441. if errors.Is(err, errKeyNotFound) {
  442. return def, nil
  443. }
  444. }
  445. return v, nil
  446. }
  447. func dig[T any](key string, data map[string]any) (t T, _ error) {
  448. if v, ok := data[key]; ok {
  449. c, k := v.(T)
  450. if !k {
  451. return t, fmt.Errorf("failed to convert value to the desired type; was: %T", v)
  452. }
  453. return c, nil
  454. }
  455. for _, v := range data {
  456. if ty, ok := v.(map[string]any); ok {
  457. return dig[T](key, ty)
  458. }
  459. }
  460. return t, errKeyNotFound
  461. }
  462. func CompareStringAndByteSlices(valueString *string, valueByte []byte) bool {
  463. if valueString == nil {
  464. return false
  465. }
  466. return bytes.Equal(valueByte, []byte(*valueString))
  467. }
  468. func ExtractSecretData(data esv1beta1.PushSecretData, secret *corev1.Secret) ([]byte, error) {
  469. var (
  470. err error
  471. value []byte
  472. ok bool
  473. )
  474. if data.GetSecretKey() == "" {
  475. decodedMap := make(map[string]string)
  476. for k, v := range secret.Data {
  477. decodedMap[k] = string(v)
  478. }
  479. value, err = JSONMarshal(decodedMap)
  480. if err != nil {
  481. return nil, fmt.Errorf("failed to marshal secret data: %w", err)
  482. }
  483. } else {
  484. value, ok = secret.Data[data.GetSecretKey()]
  485. if !ok {
  486. return nil, fmt.Errorf("failed to find secret key in secret with key: %s", data.GetSecretKey())
  487. }
  488. }
  489. return value, nil
  490. }
  491. // CreateCertOpts contains options for a cert pool creation.
  492. type CreateCertOpts struct {
  493. CABundle []byte
  494. CAProvider *esv1beta1.CAProvider
  495. StoreKind string
  496. Namespace string
  497. Client client.Client
  498. }
  499. // FetchCACertFromSource creates a CertPool using either a CABundle directly, or
  500. // a ConfigMap / Secret.
  501. func FetchCACertFromSource(ctx context.Context, opts CreateCertOpts) ([]byte, error) {
  502. if len(opts.CABundle) == 0 && opts.CAProvider == nil {
  503. return nil, nil
  504. }
  505. if len(opts.CABundle) > 0 {
  506. pem, err := base64decode(opts.CABundle)
  507. if err != nil {
  508. return nil, fmt.Errorf("failed to decode ca bundle: %w", err)
  509. }
  510. return pem, nil
  511. }
  512. if opts.CAProvider != nil &&
  513. opts.StoreKind == esv1beta1.ClusterSecretStoreKind &&
  514. opts.CAProvider.Namespace == nil {
  515. return nil, errors.New("missing namespace on caProvider secret")
  516. }
  517. switch opts.CAProvider.Type {
  518. case esv1beta1.CAProviderTypeSecret:
  519. cert, err := getCertFromSecret(ctx, opts.Client, opts.CAProvider, opts.StoreKind, opts.Namespace)
  520. if err != nil {
  521. return nil, fmt.Errorf("failed to get cert from secret: %w", err)
  522. }
  523. return cert, nil
  524. case esv1beta1.CAProviderTypeConfigMap:
  525. cert, err := getCertFromConfigMap(ctx, opts.Namespace, opts.Client, opts.CAProvider)
  526. if err != nil {
  527. return nil, fmt.Errorf("failed to get cert from configmap: %w", err)
  528. }
  529. return cert, nil
  530. }
  531. return nil, fmt.Errorf("unsupported CA provider type: %s", opts.CAProvider.Type)
  532. }
  533. func base64decode(cert []byte) ([]byte, error) {
  534. if c, err := parseCertificateBytes(cert); err == nil {
  535. return c, nil
  536. }
  537. // try decoding and test for validity again...
  538. certificate, err := Decode(esv1beta1.ExternalSecretDecodeAuto, cert)
  539. if err != nil {
  540. return nil, fmt.Errorf("failed to decode base64: %w", err)
  541. }
  542. return parseCertificateBytes(certificate)
  543. }
  544. func parseCertificateBytes(certBytes []byte) ([]byte, error) {
  545. block, _ := pem.Decode(certBytes)
  546. if block == nil {
  547. return nil, errors.New("failed to parse the new certificate, not valid pem data")
  548. }
  549. if _, err := x509.ParseCertificate(block.Bytes); err != nil {
  550. return nil, fmt.Errorf("failed to validate certificate: %w", err)
  551. }
  552. return certBytes, nil
  553. }
  554. func getCertFromSecret(ctx context.Context, c client.Client, provider *esv1beta1.CAProvider, storeKind, namespace string) ([]byte, error) {
  555. secretRef := esmeta.SecretKeySelector{
  556. Name: provider.Name,
  557. Key: provider.Key,
  558. }
  559. if provider.Namespace != nil {
  560. secretRef.Namespace = provider.Namespace
  561. }
  562. cert, err := resolvers.SecretKeyRef(ctx, c, storeKind, namespace, &secretRef)
  563. if err != nil {
  564. return nil, fmt.Errorf("failed to resolve secret key ref: %w", err)
  565. }
  566. return []byte(cert), nil
  567. }
  568. func getCertFromConfigMap(ctx context.Context, namespace string, c client.Client, provider *esv1beta1.CAProvider) ([]byte, error) {
  569. objKey := client.ObjectKey{
  570. Name: provider.Name,
  571. Namespace: namespace,
  572. }
  573. if provider.Namespace != nil {
  574. objKey.Namespace = *provider.Namespace
  575. }
  576. configMapRef := &corev1.ConfigMap{}
  577. err := c.Get(ctx, objKey, configMapRef)
  578. if err != nil {
  579. return nil, fmt.Errorf("failed to get caProvider secret %s: %w", objKey.Name, err)
  580. }
  581. val, ok := configMapRef.Data[provider.Key]
  582. if !ok {
  583. return nil, fmt.Errorf("failed to get caProvider configMap %s -> %s", objKey.Name, provider.Key)
  584. }
  585. return []byte(val), nil
  586. }