pulumi.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package pulumi
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "strings"
  19. "dario.cat/mergo"
  20. esc "github.com/pulumi/esc-sdk/sdk/go"
  21. corev1 "k8s.io/api/core/v1"
  22. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  23. "github.com/external-secrets/external-secrets/runtime/esutils"
  24. )
  25. type client struct {
  26. escClient esc.EscClient
  27. authCtx context.Context
  28. project string
  29. environment string
  30. organization string
  31. }
  32. const (
  33. errPushSecretsNotSupported = "pushing secrets is currently not supported by Pulumi"
  34. errDeleteSecretsNotSupported = "deleting secrets is currently not supported by Pulumi"
  35. errUnableToGetValues = "unable to get value for key %s: %w"
  36. errGettingAllSecretsNotSupported = "getting all secrets is currently not supported by Pulumi"
  37. errReadEnvironment = "error reading environment : %w"
  38. errPushSecrets = "error pushing secret: %w"
  39. errInterfaceType = "interface{} is not of type map[string]interface{}"
  40. errPushWholeSecret = "pushing the whole secret is not yet implemented"
  41. )
  42. var _ esv1.SecretsClient = &client{}
  43. func (c *client) GetSecret(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) ([]byte, error) {
  44. env, err := c.escClient.OpenEnvironment(c.authCtx, c.organization, c.project, c.environment)
  45. if err != nil {
  46. return nil, err
  47. }
  48. value, _, err := c.escClient.ReadEnvironmentProperty(c.authCtx, c.organization, c.project, c.environment, env.GetId(), ref.Key)
  49. if err != nil {
  50. return nil, err
  51. }
  52. return esutils.GetByteValue(value.GetValue())
  53. }
  54. func createSubmaps(input map[string]any) map[string]any {
  55. result := make(map[string]any)
  56. for key, value := range input {
  57. keys := strings.Split(key, ".")
  58. current := result
  59. for i, k := range keys {
  60. if i == len(keys)-1 {
  61. current[k] = value
  62. } else {
  63. if _, exists := current[k]; !exists {
  64. current[k] = make(map[string]any)
  65. }
  66. current = current[k].(map[string]any)
  67. }
  68. }
  69. }
  70. return result
  71. }
  72. func (c *client) PushSecret(_ context.Context, secret *corev1.Secret, data esv1.PushSecretData) error {
  73. secretKey := data.GetSecretKey()
  74. if secretKey == "" {
  75. return errors.New(errPushWholeSecret)
  76. }
  77. value := secret.Data[secretKey]
  78. updatePayload := &esc.EnvironmentDefinition{
  79. Values: &esc.EnvironmentDefinitionValues{
  80. AdditionalProperties: map[string]any{
  81. data.GetRemoteKey(): string(value),
  82. },
  83. },
  84. }
  85. _, oldValues, err := c.escClient.OpenAndReadEnvironment(c.authCtx, c.organization, c.project, c.environment)
  86. if err != nil {
  87. return fmt.Errorf(errReadEnvironment, err)
  88. }
  89. updatePayload.Values.AdditionalProperties = createSubmaps(updatePayload.Values.AdditionalProperties)
  90. if err := mergo.Merge(&updatePayload.Values.AdditionalProperties, oldValues); err != nil {
  91. return fmt.Errorf(errPushSecrets, err)
  92. }
  93. _, err = c.escClient.UpdateEnvironment(c.authCtx, c.organization, c.project, c.environment, updatePayload)
  94. if err != nil {
  95. return fmt.Errorf(errPushSecrets, err)
  96. }
  97. return nil
  98. }
  99. func (c *client) SecretExists(_ context.Context, _ esv1.PushSecretRemoteRef) (bool, error) {
  100. return false, errors.New(errPushSecretsNotSupported)
  101. }
  102. func (c *client) DeleteSecret(_ context.Context, _ esv1.PushSecretRemoteRef) error {
  103. return errors.New(errDeleteSecretsNotSupported)
  104. }
  105. // Validate returns a ready validation result without doing any additional checks.
  106. func (c *client) Validate() (esv1.ValidationResult, error) {
  107. return esv1.ValidationResultReady, nil
  108. }
  109. // GetMapFromInterface converts an interface{} to a map[string][]byte.
  110. func GetMapFromInterface(i any) (map[string][]byte, error) {
  111. // Assert the interface{} to map[string]interface{}
  112. m, ok := i.(map[string]any)
  113. if !ok {
  114. return nil, errors.New(errInterfaceType)
  115. }
  116. // Create a new map to hold the result
  117. result := make(map[string][]byte)
  118. // Iterate over the map and convert each value to []byte
  119. for key, value := range m {
  120. result[key], _ = esutils.GetByteValue(value)
  121. }
  122. return result, nil
  123. }
  124. func (c *client) GetSecretMap(_ context.Context, ref esv1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
  125. env, err := c.escClient.OpenEnvironment(c.authCtx, c.organization, c.project, c.environment)
  126. if err != nil {
  127. return nil, err
  128. }
  129. value, _, err := c.escClient.ReadEnvironmentProperty(c.authCtx, c.organization, c.project, c.environment, env.GetId(), ref.Key)
  130. if err != nil {
  131. return nil, err
  132. }
  133. kv, _ := GetMapFromInterface(value.GetValue())
  134. secretData := make(map[string][]byte)
  135. for k, v := range kv {
  136. byteValue, err := esutils.GetByteValue(v)
  137. if err != nil {
  138. return nil, err
  139. }
  140. val := esc.Value{}
  141. err = val.UnmarshalJSON(byteValue)
  142. if err != nil {
  143. return nil, err
  144. }
  145. secretData[k], err = esutils.GetByteValue(val.Value)
  146. if err != nil {
  147. return nil, fmt.Errorf(errUnableToGetValues, k, err)
  148. }
  149. }
  150. return secretData, nil
  151. }
  152. func (c *client) GetAllSecrets(_ context.Context, _ esv1.ExternalSecretFind) (map[string][]byte, error) {
  153. return nil, errors.New(errGettingAllSecretsNotSupported)
  154. }
  155. func (c *client) Close(context.Context) error {
  156. return nil
  157. }