client.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package kubernetes
  13. import (
  14. "bytes"
  15. "context"
  16. "encoding/base64"
  17. "encoding/json"
  18. "fmt"
  19. "reflect"
  20. "strings"
  21. "github.com/tidwall/gjson"
  22. v1 "k8s.io/api/core/v1"
  23. apierrors "k8s.io/apimachinery/pkg/api/errors"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "k8s.io/apimachinery/pkg/labels"
  26. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  27. "github.com/external-secrets/external-secrets/pkg/constants"
  28. "github.com/external-secrets/external-secrets/pkg/find"
  29. "github.com/external-secrets/external-secrets/pkg/metrics"
  30. "github.com/external-secrets/external-secrets/pkg/utils"
  31. )
  32. const (
  33. metaLabels = "labels"
  34. metaAnnotations = "annotations"
  35. )
  36. func (c *Client) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  37. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  38. if err != nil {
  39. return nil, err
  40. }
  41. // if property is not defined, we will return the json-serialized secret
  42. if ref.Property == "" {
  43. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  44. m := map[string]map[string]string{}
  45. m[metaLabels] = secret.Labels
  46. m[metaAnnotations] = secret.Annotations
  47. j, err := utils.JSONMarshal(m)
  48. if err != nil {
  49. return nil, err
  50. }
  51. return j, nil
  52. }
  53. m := map[string]string{}
  54. for key, val := range secret.Data {
  55. m[key] = string(val)
  56. }
  57. j, err := utils.JSONMarshal(m)
  58. if err != nil {
  59. return nil, err
  60. }
  61. return j, nil
  62. }
  63. return getSecret(secret, ref)
  64. }
  65. func (c *Client) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushSecretRemoteRef) error {
  66. if remoteRef.GetProperty() == "" {
  67. return fmt.Errorf("requires property in RemoteRef to delete secret value")
  68. }
  69. extSecret, getErr := c.userSecretClient.Get(ctx, remoteRef.GetRemoteKey(), metav1.GetOptions{})
  70. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  71. if getErr != nil {
  72. if apierrors.IsNotFound(getErr) {
  73. // return gracefully if no secret exists
  74. return nil
  75. }
  76. return getErr
  77. }
  78. if _, ok := extSecret.Data[remoteRef.GetProperty()]; !ok {
  79. // return gracefully if specified secret does not contain the given property
  80. return nil
  81. }
  82. if len(extSecret.Data) > 1 {
  83. return c.removeProperty(ctx, extSecret, remoteRef)
  84. }
  85. return c.fullDelete(ctx, remoteRef.GetRemoteKey())
  86. }
  87. func (c *Client) PushSecret(ctx context.Context, secret *v1.Secret, data esv1beta1.PushSecretData) error {
  88. if data.GetProperty() == "" && data.GetSecretKey() != "" {
  89. return fmt.Errorf("requires property in RemoteRef to push secret value if secret key is defined")
  90. }
  91. extSecret, getErr := c.userSecretClient.Get(ctx, data.GetRemoteKey(), metav1.GetOptions{})
  92. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, getErr)
  93. if getErr != nil {
  94. // create if it not exists
  95. if apierrors.IsNotFound(getErr) {
  96. typ := v1.SecretTypeOpaque
  97. if secret.Type != "" {
  98. typ = secret.Type
  99. }
  100. return c.createSecret(ctx, secret, typ, data)
  101. }
  102. return getErr
  103. }
  104. // the whole secret was pushed to the provider
  105. if data.GetSecretKey() == "" {
  106. if data.GetProperty() != "" {
  107. value, err := c.marshalData(secret)
  108. if err != nil {
  109. return err
  110. }
  111. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, value) {
  112. return nil
  113. }
  114. return c.updateProperty(ctx, extSecret, data, value)
  115. }
  116. if reflect.DeepEqual(extSecret.Data, secret.Data) {
  117. return nil
  118. }
  119. return c.updateMap(ctx, extSecret, secret.Data)
  120. }
  121. // only a single property was pushed
  122. if v, ok := extSecret.Data[data.GetProperty()]; ok && bytes.Equal(v, secret.Data[data.GetSecretKey()]) {
  123. return nil
  124. }
  125. return c.updateProperty(ctx, extSecret, data, secret.Data[data.GetSecretKey()])
  126. }
  127. func (c *Client) marshalData(secret *v1.Secret) ([]byte, error) {
  128. values := make(map[string]string)
  129. for k, v := range secret.Data {
  130. values[k] = string(v)
  131. }
  132. // marshal
  133. value, err := utils.JSONMarshal(values)
  134. if err != nil {
  135. return nil, fmt.Errorf("failed to marshal secrets into a single property: %w", err)
  136. }
  137. return value, nil
  138. }
  139. func (c *Client) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  140. secret, err := c.userSecretClient.Get(ctx, ref.Key, metav1.GetOptions{})
  141. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesGetSecret, err)
  142. if apierrors.IsNotFound(err) {
  143. return nil, esv1beta1.NoSecretError{}
  144. }
  145. if err != nil {
  146. return nil, err
  147. }
  148. var tmpMap map[string][]byte
  149. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  150. tmpMap, err = getSecretMetadata(secret)
  151. if err != nil {
  152. return nil, err
  153. }
  154. } else {
  155. tmpMap = secret.Data
  156. }
  157. if ref.Property != "" {
  158. retMap, err := getPropertyMap(ref.Key, ref.Property, tmpMap)
  159. if err != nil {
  160. return nil, err
  161. }
  162. return retMap, nil
  163. }
  164. return tmpMap, nil
  165. }
  166. func getPropertyMap(key, property string, tmpMap map[string][]byte) (map[string][]byte, error) {
  167. byteArr, err := utils.JSONMarshal(tmpMap)
  168. if err != nil {
  169. return nil, err
  170. }
  171. var retMap map[string][]byte
  172. jsonStr := string(byteArr)
  173. // We need to search if a given key with a . exists before using gjson operations.
  174. idx := strings.Index(property, ".")
  175. if idx > -1 {
  176. refProperty := strings.ReplaceAll(property, ".", "\\.")
  177. retMap, err = getMapFromValues(refProperty, jsonStr)
  178. if err != nil {
  179. return nil, err
  180. }
  181. if retMap != nil {
  182. return retMap, nil
  183. }
  184. }
  185. retMap, err = getMapFromValues(property, jsonStr)
  186. if err != nil {
  187. return nil, err
  188. }
  189. if retMap == nil {
  190. return nil, fmt.Errorf("property %s does not exist in key %s", property, key)
  191. }
  192. return retMap, nil
  193. }
  194. func getMapFromValues(property, jsonStr string) (map[string][]byte, error) {
  195. val := gjson.Get(jsonStr, property)
  196. if val.Exists() {
  197. retMap := make(map[string][]byte)
  198. var tmpMap map[string]interface{}
  199. decoded, err := base64.StdEncoding.DecodeString(val.String())
  200. if err != nil {
  201. return nil, err
  202. }
  203. err = json.Unmarshal(decoded, &tmpMap)
  204. if err != nil {
  205. return nil, err
  206. }
  207. for k, v := range tmpMap {
  208. b, err := utils.JSONMarshal(v)
  209. if err != nil {
  210. return nil, err
  211. }
  212. retMap[k] = b
  213. }
  214. return retMap, nil
  215. }
  216. return nil, nil
  217. }
  218. func getSecretMetadata(secret *v1.Secret) (map[string][]byte, error) {
  219. var err error
  220. tmpMap := make(map[string][]byte)
  221. tmpMap[metaLabels], err = utils.JSONMarshal(secret.ObjectMeta.Labels)
  222. if err != nil {
  223. return nil, err
  224. }
  225. tmpMap[metaAnnotations], err = utils.JSONMarshal(secret.ObjectMeta.Annotations)
  226. if err != nil {
  227. return nil, err
  228. }
  229. return tmpMap, nil
  230. }
  231. func (c *Client) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  232. if ref.Tags != nil {
  233. return c.findByTags(ctx, ref)
  234. }
  235. if ref.Name != nil {
  236. return c.findByName(ctx, ref)
  237. }
  238. return nil, fmt.Errorf("unexpected find operator: %#v", ref)
  239. }
  240. func (c *Client) findByTags(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  241. // empty/nil tags = everything
  242. sel, err := labels.ValidatedSelectorFromSet(ref.Tags)
  243. if err != nil {
  244. return nil, fmt.Errorf("unable to validate selector tags: %w", err)
  245. }
  246. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{LabelSelector: sel.String()})
  247. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  248. if err != nil {
  249. return nil, fmt.Errorf("unable to list secrets: %w", err)
  250. }
  251. data := make(map[string][]byte)
  252. for _, secret := range secrets.Items {
  253. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  254. if err != nil {
  255. return nil, err
  256. }
  257. data[secret.Name] = jsonStr
  258. }
  259. return utils.ConvertKeys(ref.ConversionStrategy, data)
  260. }
  261. func (c *Client) findByName(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
  262. secrets, err := c.userSecretClient.List(ctx, metav1.ListOptions{})
  263. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesListSecrets, err)
  264. if err != nil {
  265. return nil, fmt.Errorf("unable to list secrets: %w", err)
  266. }
  267. matcher, err := find.New(*ref.Name)
  268. if err != nil {
  269. return nil, err
  270. }
  271. data := make(map[string][]byte)
  272. for _, secret := range secrets.Items {
  273. if !matcher.MatchName(secret.Name) {
  274. continue
  275. }
  276. jsonStr, err := utils.JSONMarshal(convertMap(secret.Data))
  277. if err != nil {
  278. return nil, err
  279. }
  280. data[secret.Name] = jsonStr
  281. }
  282. return utils.ConvertKeys(ref.ConversionStrategy, data)
  283. }
  284. func (c *Client) Close(_ context.Context) error {
  285. return nil
  286. }
  287. func convertMap(in map[string][]byte) map[string]string {
  288. out := make(map[string]string)
  289. for k, v := range in {
  290. out[k] = string(v)
  291. }
  292. return out
  293. }
  294. func (c *Client) createSecret(ctx context.Context, secret *v1.Secret, typed v1.SecretType, remoteRef esv1beta1.PushSecretData) error {
  295. data := make(map[string][]byte)
  296. if remoteRef.GetProperty() != "" {
  297. // set a specific remote key
  298. if remoteRef.GetSecretKey() == "" {
  299. value, err := c.marshalData(secret)
  300. if err != nil {
  301. return err
  302. }
  303. data[remoteRef.GetProperty()] = value
  304. } else {
  305. // push a specific secret key into a specific remote property
  306. data[remoteRef.GetProperty()] = secret.Data[remoteRef.GetSecretKey()]
  307. }
  308. } else {
  309. // push the whole secret as is using each key of the secret as a property in the created secret
  310. data = secret.Data
  311. }
  312. s := v1.Secret{
  313. ObjectMeta: metav1.ObjectMeta{
  314. Name: remoteRef.GetRemoteKey(),
  315. Namespace: c.store.RemoteNamespace,
  316. },
  317. Data: data,
  318. Type: typed,
  319. }
  320. _, err := c.userSecretClient.Create(ctx, &s, metav1.CreateOptions{})
  321. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesCreateSecret, err)
  322. return err
  323. }
  324. // fullDelete removes remote secret completely.
  325. func (c *Client) fullDelete(ctx context.Context, secretName string) error {
  326. err := c.userSecretClient.Delete(ctx, secretName, metav1.DeleteOptions{})
  327. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesDeleteSecret, err)
  328. // gracefully return on not found
  329. if apierrors.IsNotFound(err) {
  330. return nil
  331. }
  332. return err
  333. }
  334. // removeProperty removes single data property from remote secret.
  335. func (c *Client) removeProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef) error {
  336. delete(extSecret.Data, remoteRef.GetProperty())
  337. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  338. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  339. return err
  340. }
  341. func (c *Client) updateMap(ctx context.Context, extSecret *v1.Secret, values map[string][]byte) error {
  342. // update the existing map with values from the pushed secret but keep existing values in tack.
  343. for k, v := range values {
  344. extSecret.Data[k] = v
  345. }
  346. return c.updateSecret(ctx, extSecret)
  347. }
  348. func (c *Client) updateProperty(ctx context.Context, extSecret *v1.Secret, remoteRef esv1beta1.PushSecretRemoteRef, value []byte) error {
  349. if extSecret.Data == nil {
  350. extSecret.Data = make(map[string][]byte)
  351. }
  352. // otherwise update remote secret
  353. extSecret.Data[remoteRef.GetProperty()] = value
  354. return c.updateSecret(ctx, extSecret)
  355. }
  356. func (c *Client) updateSecret(ctx context.Context, extSecret *v1.Secret) error {
  357. _, err := c.userSecretClient.Update(ctx, extSecret, metav1.UpdateOptions{})
  358. metrics.ObserveAPICall(constants.ProviderKubernetes, constants.CallKubernetesUpdateSecret, err)
  359. return err
  360. }
  361. func getSecret(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
  362. if ref.MetadataPolicy == esv1beta1.ExternalSecretMetadataPolicyFetch {
  363. s, found, err := getFromSecretMetadata(secret, ref)
  364. if err != nil {
  365. return nil, err
  366. }
  367. if !found {
  368. return nil, fmt.Errorf("property %s does not exist in metadata of secret %q", ref.Property, ref.Key)
  369. }
  370. return s, nil
  371. }
  372. s, found := getFromSecretData(secret, ref)
  373. if !found {
  374. return nil, fmt.Errorf("property %s does not exist in data of secret %q", ref.Property, ref.Key)
  375. }
  376. return s, nil
  377. }
  378. func getFromSecretData(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool) {
  379. // Check if a property with "." exists first such as file.png
  380. v, ok := secret.Data[ref.Property]
  381. if ok {
  382. return v, true
  383. }
  384. idx := strings.Index(ref.Property, ".")
  385. if idx == -1 || idx == 0 || idx == len(ref.Property)-1 {
  386. return nil, false
  387. }
  388. v, ok = secret.Data[ref.Property[:idx]]
  389. if !ok {
  390. return nil, false
  391. }
  392. val := gjson.Get(string(v), ref.Property[idx+1:])
  393. if !val.Exists() {
  394. return nil, false
  395. }
  396. return []byte(val.String()), true
  397. }
  398. func getFromSecretMetadata(secret *v1.Secret, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, bool, error) {
  399. path := strings.Split(ref.Property, ".")
  400. var metadata map[string]string
  401. switch path[0] {
  402. case metaLabels:
  403. metadata = secret.Labels
  404. case metaAnnotations:
  405. metadata = secret.Annotations
  406. default:
  407. return nil, false, nil
  408. }
  409. if len(path) == 1 {
  410. j, err := utils.JSONMarshal(metadata)
  411. if err != nil {
  412. return nil, false, err
  413. }
  414. return j, true, nil
  415. }
  416. v, ok := metadata[path[1]]
  417. if !ok {
  418. return nil, false, nil
  419. }
  420. if len(path) == 2 {
  421. return []byte(v), true, nil
  422. }
  423. val := gjson.Get(v, strings.Join(path[2:], ""))
  424. if !val.Exists() {
  425. return nil, false, nil
  426. }
  427. return []byte(val.String()), true, nil
  428. }