mirror of
https://github.com/Kingsrook/qqq.git
synced 2025-07-18 05:01:07 +00:00
Initial checkin
This commit is contained in:
@ -0,0 +1,275 @@
|
||||
/*
|
||||
* QQQ - Low-code Application Framework for Engineers.
|
||||
* Copyright (C) 2021-2023. Kingsrook, LLC
|
||||
* 651 N Broad St Ste 205 # 6917 | Middletown DE 19709 | United States
|
||||
* contact@kingsrook.com
|
||||
* https://github.com/Kingsrook/
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Affero General Public License as
|
||||
* published by the Free Software Foundation, either version 3 of the
|
||||
* License, or (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Affero General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU Affero General Public License
|
||||
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
package com.kingsrook.qqq.backend.core.instances;
|
||||
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.util.Objects;
|
||||
import java.util.Optional;
|
||||
import com.amazonaws.auth.AWSStaticCredentialsProvider;
|
||||
import com.amazonaws.auth.BasicAWSCredentials;
|
||||
import com.amazonaws.services.secretsmanager.AWSSecretsManager;
|
||||
import com.amazonaws.services.secretsmanager.AWSSecretsManagerClientBuilder;
|
||||
import com.amazonaws.services.secretsmanager.model.CreateSecretRequest;
|
||||
import com.amazonaws.services.secretsmanager.model.Filter;
|
||||
import com.amazonaws.services.secretsmanager.model.GetSecretValueRequest;
|
||||
import com.amazonaws.services.secretsmanager.model.GetSecretValueResult;
|
||||
import com.amazonaws.services.secretsmanager.model.ListSecretsRequest;
|
||||
import com.amazonaws.services.secretsmanager.model.ListSecretsResult;
|
||||
import com.amazonaws.services.secretsmanager.model.PutSecretValueRequest;
|
||||
import com.amazonaws.services.secretsmanager.model.ResourceExistsException;
|
||||
import com.amazonaws.services.secretsmanager.model.SecretListEntry;
|
||||
import com.kingsrook.qqq.backend.core.utils.StringUtils;
|
||||
import org.apache.commons.io.FileUtils;
|
||||
import org.apache.logging.log4j.LogManager;
|
||||
import org.apache.logging.log4j.Logger;
|
||||
import org.json.JSONException;
|
||||
import org.json.JSONObject;
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
** Utility class for working with AWS Secrets Manager.
|
||||
**
|
||||
** Relies on environment variables:
|
||||
** SECRETS_MANAGER_ACCESS_KEY
|
||||
** SECRETS_MANAGER_SECRET_KEY
|
||||
** SECRETS_MANAGER_REGION
|
||||
**
|
||||
*******************************************************************************/
|
||||
public class SecretsManagerUtils
|
||||
{
|
||||
private static final Logger LOG = LogManager.getLogger(SecretsManagerUtils.class);
|
||||
|
||||
private static QMetaDataVariableInterpreter qMetaDataVariableInterpreter;
|
||||
private static AWSSecretsManager _client = null;
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
** IF secret manager ENV vars are set,
|
||||
** THEN lookup all secrets starting with the given prefix,
|
||||
** and write them to a .env file (backing up any pre-existing .env files first).
|
||||
*******************************************************************************/
|
||||
public static void writeEnvFromSecretsWithNamePrefix(String prefix) throws IOException
|
||||
{
|
||||
Optional<AWSSecretsManager> optionalSecretsManagerClient = getSecretsManagerClient();
|
||||
if(optionalSecretsManagerClient.isPresent())
|
||||
{
|
||||
AWSSecretsManager client = optionalSecretsManagerClient.get();
|
||||
|
||||
ListSecretsRequest listSecretsRequest = new ListSecretsRequest().withFilters(new Filter().withKey("name").withValues(prefix));
|
||||
listSecretsRequest.withMaxResults(100);
|
||||
ListSecretsResult listSecretsResult = client.listSecrets(listSecretsRequest);
|
||||
|
||||
StringBuilder fullEnv = new StringBuilder();
|
||||
while(true)
|
||||
{
|
||||
for(SecretListEntry secretListEntry : listSecretsResult.getSecretList())
|
||||
{
|
||||
String nameWithoutPrefix = secretListEntry.getName().replace(prefix, "");
|
||||
Optional<String> secretValue = getSecret(prefix, nameWithoutPrefix);
|
||||
if(secretValue.isPresent())
|
||||
{
|
||||
String envLine = nameWithoutPrefix + "=" + secretValue.get();
|
||||
fullEnv.append(envLine).append('\n');
|
||||
}
|
||||
}
|
||||
|
||||
if(listSecretsResult.getNextToken() != null)
|
||||
{
|
||||
LOG.trace("Calling for next token...");
|
||||
listSecretsRequest.setNextToken(listSecretsResult.getNextToken());
|
||||
listSecretsResult = client.listSecrets(listSecretsRequest);
|
||||
}
|
||||
else
|
||||
{
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
File dotEnv = new File(".env");
|
||||
if(dotEnv.exists())
|
||||
{
|
||||
dotEnv.renameTo(new File(".env.backup-" + System.currentTimeMillis()));
|
||||
}
|
||||
|
||||
FileUtils.writeStringToFile(dotEnv, fullEnv.toString());
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG.info("Not writing .env from secrets manager");
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
** Get a single secret value.
|
||||
**
|
||||
** The lookup in secrets manager is done by (path + name). Then, in the value
|
||||
** that comes back, if it looks like JSON, we look for a value inside it under
|
||||
** the key of just "name". Else, if we didn't get JSON back, then we just return
|
||||
** the full text value of the secret.
|
||||
*******************************************************************************/
|
||||
public static Optional<String> getSecret(String path, String name)
|
||||
{
|
||||
Optional<AWSSecretsManager> optionalSecretsManagerClient = getSecretsManagerClient();
|
||||
if(optionalSecretsManagerClient.isPresent())
|
||||
{
|
||||
try
|
||||
{
|
||||
AWSSecretsManager client = optionalSecretsManagerClient.get();
|
||||
String secretId = path + name;
|
||||
GetSecretValueRequest getSecretValueRequest = new GetSecretValueRequest().withSecretId(secretId);
|
||||
|
||||
GetSecretValueResult getSecretValueResult = client.getSecretValue(getSecretValueRequest);
|
||||
|
||||
try
|
||||
{
|
||||
JSONObject secretJSON = new JSONObject(getSecretValueResult.getSecretString());
|
||||
|
||||
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
||||
// know we know it's a json object - so - commit to either returning the value under this name, else warning and returning empty //
|
||||
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
||||
if(secretJSON.has(name))
|
||||
{
|
||||
return (Optional.of(secretJSON.getString(name)));
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG.warn("SecretsManager secret at [" + secretId + "] was a JSON object, but it did not contain a key of [" + name + "] - so returning empty.");
|
||||
return (Optional.empty());
|
||||
}
|
||||
}
|
||||
catch(JSONException je)
|
||||
{
|
||||
//////////////////////////////////////////////////////////////////////////////////////////////////
|
||||
// if the secret value couldn't be parsed as json, then assume it to be text and just return it //
|
||||
//////////////////////////////////////////////////////////////////////////////////////////////////
|
||||
return (Optional.of(getSecretValueResult.getSecretString()));
|
||||
}
|
||||
}
|
||||
catch(Exception e)
|
||||
{
|
||||
LOG.debug("Error getting secret from secretManager: ", e);
|
||||
}
|
||||
}
|
||||
|
||||
return (Optional.empty());
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
** Tries to do a Create - if that fails, then does a Put (update).
|
||||
**
|
||||
** Path is expected to end in a /, but I suppose it isn't strictly required.
|
||||
*******************************************************************************/
|
||||
public static void writeSecret(String path, String name, String value)
|
||||
{
|
||||
JSONObject secretJson = new JSONObject();
|
||||
secretJson.put(name, value);
|
||||
|
||||
Optional<AWSSecretsManager> optionalSecretsManagerClient = getSecretsManagerClient();
|
||||
if(optionalSecretsManagerClient.isPresent())
|
||||
{
|
||||
AWSSecretsManager client = optionalSecretsManagerClient.get();
|
||||
|
||||
try
|
||||
{
|
||||
CreateSecretRequest createSecretRequest = new CreateSecretRequest();
|
||||
createSecretRequest.setName(path + name);
|
||||
createSecretRequest.setSecretString(secretJson.toString());
|
||||
client.createSecret(createSecretRequest);
|
||||
}
|
||||
catch(ResourceExistsException e)
|
||||
{
|
||||
PutSecretValueRequest putSecretValueRequest = new PutSecretValueRequest();
|
||||
putSecretValueRequest.setSecretId(path + name);
|
||||
putSecretValueRequest.setSecretString(secretJson.toString());
|
||||
client.putSecretValue(putSecretValueRequest);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
**
|
||||
*******************************************************************************/
|
||||
private static Optional<AWSSecretsManager> getSecretsManagerClient()
|
||||
{
|
||||
if(_client == null)
|
||||
{
|
||||
QMetaDataVariableInterpreter interpreter = getQMetaDataVariableInterpreter();
|
||||
|
||||
String accessKey = interpreter.interpret("${env.SECRETS_MANAGER_ACCESS_KEY}");
|
||||
String secretKey = interpreter.interpret("${env.SECRETS_MANAGER_SECRET_KEY}");
|
||||
String region = interpreter.interpret("${env.SECRETS_MANAGER_REGION}");
|
||||
|
||||
if(StringUtils.hasContent(accessKey) && StringUtils.hasContent(secretKey) && StringUtils.hasContent(region))
|
||||
{
|
||||
try
|
||||
{
|
||||
BasicAWSCredentials credentials = new BasicAWSCredentials(accessKey, secretKey);
|
||||
_client = AWSSecretsManagerClientBuilder.standard()
|
||||
.withCredentials(new AWSStaticCredentialsProvider(credentials))
|
||||
.withRegion(region)
|
||||
.build();
|
||||
}
|
||||
catch(Exception e)
|
||||
{
|
||||
LOG.error("Error opening Secrets Manager client", e);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
LOG.warn("One or more SECRETS_MANAGER env var was not set. Unable to open Secrets Manager client.");
|
||||
}
|
||||
}
|
||||
|
||||
return (Optional.ofNullable(_client));
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
**
|
||||
*******************************************************************************/
|
||||
private static QMetaDataVariableInterpreter getQMetaDataVariableInterpreter()
|
||||
{
|
||||
return Objects.requireNonNullElseGet(qMetaDataVariableInterpreter, QMetaDataVariableInterpreter::new);
|
||||
}
|
||||
|
||||
|
||||
|
||||
/*******************************************************************************
|
||||
** Ideally meant for tests or one-offs to set up a variable interpreter with
|
||||
** an override ENV.
|
||||
*******************************************************************************/
|
||||
static void setQMetaDataVariableInterpreter(QMetaDataVariableInterpreter qMetaDataVariableInterpreter)
|
||||
{
|
||||
SecretsManagerUtils.qMetaDataVariableInterpreter = qMetaDataVariableInterpreter;
|
||||
}
|
||||
|
||||
}
|
Reference in New Issue
Block a user