fake.go 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package fake
  13. import (
  14. "context"
  15. "encoding/json"
  16. "fmt"
  17. "strings"
  18. "github.com/tidwall/gjson"
  19. corev1 "k8s.io/api/core/v1"
  20. "sigs.k8s.io/controller-runtime/pkg/client"
  21. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  22. "github.com/external-secrets/external-secrets/pkg/find"
  23. "github.com/external-secrets/external-secrets/pkg/utils"
  24. )
  25. var (
  26. errMissingStore = fmt.Errorf("missing store provider")
  27. errMissingFakeProvider = fmt.Errorf("missing store provider fake")
  28. errMissingKeyField = "key must be set in data %v"
  29. errMissingValueField = "at least one of value or valueMap must be set in data %v"
  30. )
  31. type SourceOrigin string
  32. const (
  33. FakeSecretStore SourceOrigin = "SecretStore"
  34. FakeSetSecret SourceOrigin = "SetSecret"
  35. )
  36. type Data struct {
  37. Value string
  38. Version string
  39. ValueMap map[string]string
  40. Origin SourceOrigin
  41. }
  42. type Config map[string]*Data
  43. type Provider struct {
  44. config Config
  45. database map[string]Config
  46. }
  47. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  48. func (p *Provider) Capabilities() esv1beta1.SecretStoreCapabilities {
  49. return esv1beta1.SecretStoreReadWrite
  50. }
  51. func (p *Provider) NewClient(_ context.Context, store esv1beta1.GenericStore, _ client.Client, _ string) (esv1beta1.SecretsClient, error) {
  52. if p.database == nil {
  53. p.database = make(map[string]Config)
  54. }
  55. c, err := getProvider(store)
  56. if err != nil {
  57. return nil, err
  58. }
  59. cfg := p.database[store.GetName()]
  60. if cfg == nil {
  61. cfg = Config{}
  62. }
  63. // We want to remove any FakeSecretStore entry from memory
  64. // this will ensure SecretStores can delete from memory.
  65. for key, data := range cfg {
  66. if data.Origin == FakeSecretStore {
  67. delete(cfg, key)
  68. }
  69. }
  70. for _, data := range c.Data {
  71. key := mapKey(data.Key, data.Version)
  72. cfg[key] = &Data{
  73. Value: data.Value,
  74. Version: data.Version,
  75. Origin: FakeSecretStore,
  76. }
  77. if data.ValueMap != nil {
  78. cfg[key].ValueMap = data.ValueMap
  79. }
  80. }
  81. p.database[store.GetName()] = cfg
  82. return &Provider{
  83. config: cfg,
  84. }, nil
  85. }
  86. func getProvider(store esv1beta1.GenericStore) (*esv1beta1.FakeProvider, error) {
  87. if store == nil {
  88. return nil, errMissingStore
  89. }
  90. spc := store.GetSpec()
  91. if spc == nil || spc.Provider == nil || spc.Provider.Fake == nil {
  92. return nil, errMissingFakeProvider
  93. }
  94. return spc.Provider.Fake, nil
  95. }
  96. func (p *Provider) DeleteSecret(_ context.Context, _ esv1beta1.PushSecretRemoteRef) error {
  97. return nil
  98. }
  99. func (p *Provider) PushSecret(_ context.Context, secret *corev1.Secret, data esv1beta1.PushSecretData) error {
  100. value := secret.Data[data.GetSecretKey()]
  101. currentData, ok := p.config[data.GetRemoteKey()]
  102. if !ok {
  103. p.config[data.GetRemoteKey()] = &Data{
  104. Value: string(value),
  105. Origin: FakeSetSecret,
  106. }
  107. return nil
  108. }
  109. if currentData.Origin != FakeSetSecret {
  110. return fmt.Errorf("key already exists")
  111. }
  112. currentData.Value = string(value)
  113. return nil
  114. }
  115. // GetAllSecrets returns multiple secrets from the given ExternalSecretFind
  116. // Currently, only the Name operator is supported.
  117. func (p *Provider) GetAllSecrets(_ context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  118. if ref.Name != nil {
  119. matcher, err := find.New(*ref.Name)
  120. if err != nil {
  121. return nil, err
  122. }
  123. latestVersionMap := make(map[string]string)
  124. dataMap := make(map[string][]byte)
  125. for key, data := range p.config {
  126. // Reconstruct the original key without the version suffix
  127. // See the mapKey function to know how the provider generates keys
  128. originalKey := strings.TrimSuffix(key, data.Version)
  129. if !matcher.MatchName(originalKey) {
  130. continue
  131. }
  132. if version, ok := latestVersionMap[originalKey]; ok {
  133. // Need to get only the latest version
  134. if version < data.Version {
  135. latestVersionMap[originalKey] = data.Version
  136. dataMap[originalKey] = []byte(data.Value)
  137. }
  138. } else {
  139. latestVersionMap[originalKey] = data.Version
  140. dataMap[originalKey] = []byte(data.Value)
  141. }
  142. }
  143. return utils.ConvertKeys(ref.ConversionStrategy, dataMap)
  144. }
  145. return nil, fmt.Errorf("unsupported find operator: %#v", ref)
  146. }
  147. // GetSecret returns a single secret from the provider.
  148. func (p *Provider) GetSecret(_ context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  149. data, ok := p.config[mapKey(ref.Key, ref.Version)]
  150. if !ok || data.Version != ref.Version {
  151. return nil, esv1beta1.NoSecretErr
  152. }
  153. if ref.Property != "" {
  154. val := gjson.Get(data.Value, ref.Property)
  155. if !val.Exists() {
  156. return nil, esv1beta1.NoSecretErr
  157. }
  158. return []byte(val.String()), nil
  159. }
  160. return []byte(data.Value), nil
  161. }
  162. // GetSecretMap returns multiple k/v pairs from the provider.
  163. func (p *Provider) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  164. ddata, ok := p.config[mapKey(ref.Key, ref.Version)]
  165. if !ok || ddata.Version != ref.Version {
  166. return nil, esv1beta1.NoSecretErr
  167. }
  168. // Due to backward compatibility valueMap will still be returned for now
  169. if ddata.ValueMap != nil {
  170. return convertMap(ddata.ValueMap), nil
  171. }
  172. data, err := p.GetSecret(ctx, ref)
  173. if err != nil {
  174. return nil, err
  175. }
  176. secretData := make(map[string][]byte)
  177. kv := make(map[string]json.RawMessage)
  178. err = json.Unmarshal(data, &kv)
  179. if err != nil {
  180. return nil, fmt.Errorf("unable to unmarshal secret: %w", err)
  181. }
  182. for k, v := range kv {
  183. var strVal string
  184. err = json.Unmarshal(v, &strVal)
  185. if err == nil {
  186. secretData[k] = []byte(strVal)
  187. } else {
  188. secretData[k] = v
  189. }
  190. }
  191. return secretData, nil
  192. }
  193. func convertMap(in map[string]string) map[string][]byte {
  194. m := make(map[string][]byte)
  195. for k, v := range in {
  196. m[k] = []byte(v)
  197. }
  198. return m
  199. }
  200. func (p *Provider) Close(_ context.Context) error {
  201. return nil
  202. }
  203. func (p *Provider) Validate() (esv1beta1.ValidationResult, error) {
  204. return esv1beta1.ValidationResultReady, nil
  205. }
  206. func (p *Provider) ValidateStore(store esv1beta1.GenericStore) error {
  207. prov := store.GetSpec().Provider.Fake
  208. if prov == nil {
  209. return nil
  210. }
  211. for pos, data := range prov.Data {
  212. if data.Key == "" {
  213. return fmt.Errorf(errMissingKeyField, pos)
  214. }
  215. if data.Value == "" && data.ValueMap == nil {
  216. return fmt.Errorf(errMissingValueField, pos)
  217. }
  218. }
  219. return nil
  220. }
  221. func mapKey(key, version string) string {
  222. // Add the version suffix to preserve entries with the old versions as well.
  223. return fmt.Sprintf("%v%v", key, version)
  224. }
  225. func init() {
  226. esv1beta1.Register(&Provider{}, &esv1beta1.SecretStoreProvider{
  227. Fake: &esv1beta1.FakeProvider{},
  228. })
  229. }