fake.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package fake
  14. import (
  15. "context"
  16. "encoding/json"
  17. "errors"
  18. "fmt"
  19. "strings"
  20. "github.com/tidwall/gjson"
  21. corev1 "k8s.io/api/core/v1"
  22. "sigs.k8s.io/controller-runtime/pkg/client"
  23. "sigs.k8s.io/controller-runtime/pkg/webhook/admission"
  24. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  25. "github.com/external-secrets/external-secrets/runtime/esutils"
  26. "github.com/external-secrets/external-secrets/runtime/find"
  27. )
  28. var (
  29. errMissingStore = errors.New("missing store provider")
  30. errMissingFakeProvider = errors.New("missing store provider fake")
  31. errMissingKeyField = "key must be set in data %v"
  32. errMissingValueField = "at least one value must be set in data %v"
  33. )
  34. type SourceOrigin string
  35. const (
  36. FakeSecretStore SourceOrigin = "SecretStore"
  37. FakeSetSecret SourceOrigin = "SetSecret"
  38. )
  39. type Data struct {
  40. Value string
  41. Version string
  42. Origin SourceOrigin
  43. }
  44. type Config map[string]*Data
  45. type Provider struct {
  46. config Config
  47. database map[string]Config
  48. validationResult *esv1.ValidationResult
  49. }
  50. // Capabilities return the provider supported capabilities (ReadOnly, WriteOnly, ReadWrite).
  51. func (p *Provider) Capabilities() esv1.SecretStoreCapabilities {
  52. return esv1.SecretStoreReadWrite
  53. }
  54. func (p *Provider) NewClient(_ context.Context, store esv1.GenericStore, _ client.Client, _ string) (esv1.SecretsClient, error) {
  55. if p.database == nil {
  56. p.database = make(map[string]Config)
  57. }
  58. c, err := getProvider(store)
  59. if err != nil {
  60. return nil, err
  61. }
  62. cfg := p.database[store.GetName()]
  63. if cfg == nil {
  64. cfg = Config{}
  65. }
  66. // We want to remove any FakeSecretStore entry from memory
  67. // this will ensure SecretStores can delete from memory.
  68. for key, data := range cfg {
  69. if data.Origin == FakeSecretStore {
  70. delete(cfg, key)
  71. }
  72. }
  73. for _, data := range c.Data {
  74. key := mapKey(data.Key, data.Version)
  75. cfg[key] = &Data{
  76. Value: data.Value,
  77. Version: data.Version,
  78. Origin: FakeSecretStore,
  79. }
  80. }
  81. p.database[store.GetName()] = cfg
  82. return &Provider{
  83. config: cfg,
  84. validationResult: c.ValidationResult,
  85. }, nil
  86. }
  87. func getProvider(store esv1.GenericStore) (*esv1.FakeProvider, error) {
  88. if store == nil {
  89. return nil, errMissingStore
  90. }
  91. spc := store.GetSpec()
  92. if spc == nil || spc.Provider == nil || spc.Provider.Fake == nil {
  93. return nil, errMissingFakeProvider
  94. }
  95. return spc.Provider.Fake, nil
  96. }
  97. func (p *Provider) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  98. return nil
  99. }
  100. func (p *Provider) SecretExists(_ context.Context, ref esv1.PushSecretRemoteRef) (bool, error) {
  101. _, ok := p.config[ref.GetRemoteKey()]
  102. return ok, nil
  103. }
  104. func (p *Provider) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  105. value := secret.Data[data.GetSecretKey()]
  106. currentData, ok := p.config[data.GetRemoteKey()]
  107. if !ok {
  108. p.config[data.GetRemoteKey()] = &Data{
  109. Value: string(value),
  110. Origin: FakeSetSecret,
  111. }
  112. return nil
  113. }
  114. if currentData.Origin != FakeSetSecret {
  115. return errors.New("key already exists")
  116. }
  117. currentData.Value = string(value)
  118. return nil
  119. }
  120. // GetAllSecrets returns multiple secrets from the given ExternalSecretFind
  121. // Currently, only the Name operator is supported.
  122. func (p *Provider) GetAllSecrets(_ context.Context, ref esv1.ExternalSecretFind) (map[string][]byte, error) {
  123. if ref.Name == nil {
  124. return nil, fmt.Errorf("unsupported find operator: %#v", ref)
  125. }
  126. matcher, err := find.New(*ref.Name)
  127. if err != nil {
  128. return nil, err
  129. }
  130. dataMap := p.collectMatchingSecrets(matcher)
  131. return esutils.ConvertKeys(ref.ConversionStrategy, dataMap)
  132. }
  133. func (p *Provider) collectMatchingSecrets(matcher *find.Matcher) map[string][]byte {
  134. latestVersionMap := make(map[string]string)
  135. dataMap := make(map[string][]byte)
  136. for key, data := range p.config {
  137. originalKey := strings.TrimSuffix(key, data.Version)
  138. if !matcher.MatchName(originalKey) {
  139. continue
  140. }
  141. p.updateLatestVersion(originalKey, data, latestVersionMap, dataMap)
  142. }
  143. return dataMap
  144. }
  145. func (p *Provider) updateLatestVersion(originalKey string, data *Data, latestVersionMap map[string]string, dataMap map[string][]byte) {
  146. version, exists := latestVersionMap[originalKey]
  147. if !exists || version < data.Version {
  148. latestVersionMap[originalKey] = data.Version
  149. dataMap[originalKey] = []byte(data.Value)
  150. }
  151. }
  152. // GetSecret returns a single secret from the provider.
  153. func (p *Provider) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  154. data, ok := p.config[mapKey(ref.Key, ref.Version)]
  155. if !ok || data.Version != ref.Version {
  156. return nil, esv1.NoSecretErr
  157. }
  158. if ref.Property != "" {
  159. val := gjson.Get(data.Value, ref.Property)
  160. if !val.Exists() {
  161. return nil, esv1.NoSecretErr
  162. }
  163. return []byte(val.String()), nil
  164. }
  165. return []byte(data.Value), nil
  166. }
  167. // GetSecretMap returns multiple k/v pairs from the provider.
  168. func (p *Provider) GetSecretMap(ctx context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  169. ddata, ok := p.config[mapKey(ref.Key, ref.Version)]
  170. if !ok || ddata.Version != ref.Version {
  171. return nil, esv1.NoSecretErr
  172. }
  173. data, err := p.GetSecret(ctx, ref)
  174. if err != nil {
  175. return nil, err
  176. }
  177. secretData := make(map[string][]byte)
  178. kv := make(map[string]json.RawMessage)
  179. err = json.Unmarshal(data, &kv)
  180. if err != nil {
  181. return nil, fmt.Errorf("unable to unmarshal secret: %w", err)
  182. }
  183. for k, v := range kv {
  184. var strVal string
  185. err = json.Unmarshal(v, &strVal)
  186. if err == nil {
  187. secretData[k] = []byte(strVal)
  188. } else {
  189. secretData[k] = v
  190. }
  191. }
  192. return secretData, nil
  193. }
  194. func (p *Provider) Close(_ context.Context) error {
  195. return nil
  196. }
  197. func (p *Provider) Validate() (esv1.ValidationResult, error) {
  198. if p.validationResult != nil && *p.validationResult != esv1.ValidationResultReady {
  199. return *p.validationResult, errors.New("unable to validate")
  200. }
  201. return esv1.ValidationResultReady, nil
  202. }
  203. func (p *Provider) ValidateStore(store esv1.GenericStore) (admission.Warnings, error) {
  204. prov := store.GetSpec().Provider.Fake
  205. if prov == nil {
  206. return nil, nil
  207. }
  208. for pos, data := range prov.Data {
  209. if data.Key == "" {
  210. return nil, fmt.Errorf(errMissingKeyField, pos)
  211. }
  212. if data.Value == "" {
  213. return nil, fmt.Errorf(errMissingValueField, pos)
  214. }
  215. }
  216. return nil, nil
  217. }
  218. func mapKey(key, version string) string {
  219. // Add the version suffix to preserve entries with the old versions as well.
  220. return fmt.Sprintf("%v%v", key, version)
  221. }
  222. // NewProvider creates a new Provider instance.
  223. func NewProvider() esv1.Provider {
  224. return &Provider{}
  225. }
  226. // ProviderSpec returns the provider specification for registration.
  227. func ProviderSpec() *esv1.SecretStoreProvider {
  228. return &esv1.SecretStoreProvider{
  229. Fake: &esv1.FakeProvider{},
  230. }
  231. }
  232. // MaintenanceStatus returns the maintenance status of the provider.
  233. func MaintenanceStatus() esv1.MaintenanceStatus {
  234. return esv1.MaintenanceStatusNotMaintained
  235. }