externalsecret_controller.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package externalsecret
  13. import (
  14. "context"
  15. // nolint
  16. "crypto/md5"
  17. "fmt"
  18. "time"
  19. "github.com/go-logr/logr"
  20. "github.com/prometheus/client_golang/prometheus"
  21. v1 "k8s.io/api/core/v1"
  22. apierrors "k8s.io/apimachinery/pkg/api/errors"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/apimachinery/pkg/runtime"
  25. "k8s.io/apimachinery/pkg/types"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. "sigs.k8s.io/controller-runtime/pkg/client"
  28. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  29. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  30. "github.com/external-secrets/external-secrets/pkg/provider"
  31. // Loading registered providers.
  32. _ "github.com/external-secrets/external-secrets/pkg/provider/register"
  33. schema "github.com/external-secrets/external-secrets/pkg/provider/schema"
  34. "github.com/external-secrets/external-secrets/pkg/template"
  35. utils "github.com/external-secrets/external-secrets/pkg/utils"
  36. )
  37. const (
  38. requeueAfter = time.Second * 30
  39. errGetES = "could not get ExternalSecret"
  40. errReconcileES = "could not reconcile ExternalSecret"
  41. errPatchStatus = "unable to patch status"
  42. errGetSecretStore = "could not get SecretStore %q, %w"
  43. errGetClusterSecretStore = "could not get ClusterSecretStore %q, %w"
  44. errStoreRef = "could not get store reference"
  45. errStoreProvider = "could not get store provider"
  46. errStoreClient = "could not get provider client"
  47. errCloseStoreClient = "could not close provider client"
  48. errSetCtrlReference = "could not set ExternalSecret controller reference: %w"
  49. errFetchTplFrom = "error fetching templateFrom data: %w"
  50. errGetSecretData = "could not get secret data from provider: %w"
  51. errExecTpl = "could not execute template: %w"
  52. errPolicyMergeNotFound = "the desired secret %s was not found. With creationPolicy=Merge the secret won't be created"
  53. errPolicyMergeGetSecret = "unable to get secret %s: %w"
  54. errPolicyMergeMutate = "unable to mutate secret %s: %w"
  55. errPolicyMergePatch = "unable to patch secret %s: %w"
  56. errGetSecretKey = "key %q from ExternalSecret %q: %w"
  57. errTplCMMissingKey = "error in configmap %s: missing key %s"
  58. errTplSecMissingKey = "error in secret %s: missing key %s"
  59. )
  60. // Reconciler reconciles a ExternalSecret object.
  61. type Reconciler struct {
  62. client.Client
  63. Log logr.Logger
  64. Scheme *runtime.Scheme
  65. ControllerClass string
  66. RequeueInterval time.Duration
  67. }
  68. // Reconcile implements the main reconciliation loop
  69. // for watched objects (ExternalSecret, ClusterSecretStore and SecretStore),
  70. // and updates/creates a Kubernetes secret based on them.
  71. func (r *Reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
  72. log := r.Log.WithValues("ExternalSecret", req.NamespacedName)
  73. syncCallsMetricLabels := prometheus.Labels{"name": req.Name, "namespace": req.Namespace}
  74. var externalSecret esv1alpha1.ExternalSecret
  75. err := r.Get(ctx, req.NamespacedName, &externalSecret)
  76. if apierrors.IsNotFound(err) {
  77. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  78. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretDeleted, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretDeleted, "Secret was deleted")
  79. SetExternalSecretCondition(&esv1alpha1.ExternalSecret{
  80. ObjectMeta: metav1.ObjectMeta{
  81. Name: req.Name,
  82. Namespace: req.Namespace,
  83. },
  84. }, *conditionSynced)
  85. return ctrl.Result{}, nil
  86. } else if err != nil {
  87. log.Error(err, errGetES)
  88. syncCallsError.With(syncCallsMetricLabels).Inc()
  89. return ctrl.Result{}, nil
  90. }
  91. // patch status when done processing
  92. p := client.MergeFrom(externalSecret.DeepCopy())
  93. defer func() {
  94. err = r.Status().Patch(ctx, &externalSecret, p)
  95. if err != nil {
  96. log.Error(err, errPatchStatus)
  97. }
  98. }()
  99. store, err := r.getStore(ctx, &externalSecret)
  100. if err != nil {
  101. log.Error(err, errStoreRef)
  102. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  103. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  104. syncCallsError.With(syncCallsMetricLabels).Inc()
  105. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  106. }
  107. log = log.WithValues("SecretStore", store.GetNamespacedName())
  108. // check if store should be handled by this controller instance
  109. if !shouldProcessStore(store, r.ControllerClass) {
  110. log.Info("skippig unmanaged store")
  111. return ctrl.Result{}, nil
  112. }
  113. storeProvider, err := schema.GetProvider(store)
  114. if err != nil {
  115. log.Error(err, errStoreProvider)
  116. syncCallsError.With(syncCallsMetricLabels).Inc()
  117. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  118. }
  119. secretClient, err := storeProvider.NewClient(ctx, store, r.Client, req.Namespace)
  120. if err != nil {
  121. log.Error(err, errStoreClient)
  122. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  123. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  124. syncCallsError.With(syncCallsMetricLabels).Inc()
  125. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  126. }
  127. defer func() {
  128. err = secretClient.Close(ctx)
  129. if err != nil {
  130. log.Error(err, errCloseStoreClient)
  131. }
  132. }()
  133. refreshInt := r.RequeueInterval
  134. if externalSecret.Spec.RefreshInterval != nil {
  135. refreshInt = externalSecret.Spec.RefreshInterval.Duration
  136. }
  137. // refresh should be skipped if
  138. // 1. resource generation hasn't changed
  139. // 2. refresh interval is 0
  140. // 3. if we're still within refresh-interval
  141. if !shouldRefresh(externalSecret) {
  142. log.V(1).Info("skipping refresh", "rv", getResourceVersion(externalSecret))
  143. return ctrl.Result{RequeueAfter: refreshInt}, nil
  144. }
  145. secret := &v1.Secret{
  146. ObjectMeta: metav1.ObjectMeta{
  147. Name: externalSecret.Spec.Target.Name,
  148. Namespace: externalSecret.Namespace,
  149. },
  150. Data: make(map[string][]byte),
  151. }
  152. mutationFunc := func() error {
  153. if externalSecret.Spec.Target.CreationPolicy == esv1alpha1.Owner {
  154. err = controllerutil.SetControllerReference(&externalSecret, &secret.ObjectMeta, r.Scheme)
  155. if err != nil {
  156. return fmt.Errorf(errSetCtrlReference, err)
  157. }
  158. }
  159. mergeMetadata(secret, externalSecret)
  160. var tplMap map[string][]byte
  161. var dataMap map[string][]byte
  162. // get data
  163. dataMap, err = r.getProviderSecretData(ctx, secretClient, &externalSecret)
  164. if err != nil {
  165. return fmt.Errorf(errGetSecretData, err)
  166. }
  167. // no template: copy data and return
  168. if externalSecret.Spec.Target.Template == nil {
  169. for k, v := range dataMap {
  170. secret.Data[k] = v
  171. }
  172. return nil
  173. }
  174. // template: fetch & execute templates
  175. tplMap, err = r.getTemplateData(ctx, &externalSecret)
  176. if err != nil {
  177. return fmt.Errorf(errFetchTplFrom, err)
  178. }
  179. // override templateFrom data with template data
  180. for k, v := range externalSecret.Spec.Target.Template.Data {
  181. tplMap[k] = []byte(v)
  182. }
  183. log.V(1).Info("found template data", "tpl_data", tplMap)
  184. err = template.Execute(tplMap, dataMap, secret)
  185. if err != nil {
  186. return fmt.Errorf(errExecTpl, err)
  187. }
  188. return nil
  189. }
  190. //nolint
  191. switch externalSecret.Spec.Target.CreationPolicy {
  192. case esv1alpha1.Merge:
  193. err = patchSecret(ctx, r.Client, r.Scheme, secret, mutationFunc)
  194. case esv1alpha1.None:
  195. log.V(1).Info("secret creation skipped due to creationPolicy=None")
  196. err = nil
  197. default:
  198. _, err = ctrl.CreateOrUpdate(ctx, r.Client, secret, mutationFunc)
  199. }
  200. if err != nil {
  201. log.Error(err, errReconcileES)
  202. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  203. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  204. syncCallsError.With(syncCallsMetricLabels).Inc()
  205. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  206. }
  207. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionTrue, esv1alpha1.ConditionReasonSecretSynced, "Secret was synced")
  208. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  209. externalSecret.Status.RefreshTime = metav1.NewTime(time.Now())
  210. externalSecret.Status.SyncedResourceVersion = getResourceVersion(externalSecret)
  211. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  212. log.V(1).Info("reconciled secret")
  213. return ctrl.Result{
  214. RequeueAfter: refreshInt,
  215. }, nil
  216. }
  217. func patchSecret(ctx context.Context, c client.Client, scheme *runtime.Scheme, secret *v1.Secret, mutationFunc func() error) error {
  218. err := c.Get(ctx, client.ObjectKeyFromObject(secret), secret.DeepCopy())
  219. if apierrors.IsNotFound(err) {
  220. return fmt.Errorf(errPolicyMergeNotFound, secret.Name)
  221. }
  222. if err != nil {
  223. return fmt.Errorf(errPolicyMergeGetSecret, secret.Name, err)
  224. }
  225. err = mutationFunc()
  226. if err != nil {
  227. return fmt.Errorf(errPolicyMergeMutate, secret.Name, err)
  228. }
  229. // GVK is missing in the Secret, see:
  230. // https://github.com/kubernetes-sigs/controller-runtime/issues/526
  231. // https://github.com/kubernetes-sigs/controller-runtime/issues/1517
  232. // https://github.com/kubernetes/kubernetes/issues/80609
  233. // we need to manually set it befor doing a Patch() as it depends on the GVK
  234. gvks, unversioned, err := scheme.ObjectKinds(secret)
  235. if err != nil {
  236. return err
  237. }
  238. if !unversioned && len(gvks) == 1 {
  239. secret.SetGroupVersionKind(gvks[0])
  240. }
  241. // we might get into a conflict here if we are not the manager of that particular field
  242. // we do not resolve the conflict and return an error instead
  243. // see: https://kubernetes.io/docs/reference/using-api/server-side-apply/#conflicts
  244. err = c.Patch(ctx, secret, client.Apply, client.FieldOwner("external-secrets"))
  245. if err != nil {
  246. return fmt.Errorf(errPolicyMergePatch, secret.Name, err)
  247. }
  248. return nil
  249. }
  250. // shouldProcessStore returns true if the store should be processed.
  251. func shouldProcessStore(store esv1alpha1.GenericStore, class string) bool {
  252. if store.GetSpec().Controller == "" || store.GetSpec().Controller == class {
  253. return true
  254. }
  255. return false
  256. }
  257. func getResourceVersion(es esv1alpha1.ExternalSecret) string {
  258. return fmt.Sprintf("%d-%s", es.ObjectMeta.GetGeneration(), hashMeta(es.ObjectMeta))
  259. }
  260. func hashMeta(m metav1.ObjectMeta) string {
  261. type meta struct {
  262. annotations map[string]string
  263. labels map[string]string
  264. }
  265. h := md5.New() //nolint
  266. _, _ = h.Write([]byte(fmt.Sprintf("%v", meta{
  267. annotations: m.Annotations,
  268. labels: m.Labels,
  269. })))
  270. return fmt.Sprintf("%x", h.Sum(nil))
  271. }
  272. func shouldRefresh(es esv1alpha1.ExternalSecret) bool {
  273. // refresh if resource version changed
  274. if es.Status.SyncedResourceVersion != getResourceVersion(es) {
  275. return true
  276. }
  277. // skip refresh if refresh interval is 0
  278. if es.Spec.RefreshInterval.Duration == 0 && es.Status.SyncedResourceVersion != "" {
  279. return false
  280. }
  281. if es.Status.RefreshTime.IsZero() {
  282. return true
  283. }
  284. return !es.Status.RefreshTime.Add(es.Spec.RefreshInterval.Duration).After(time.Now())
  285. }
  286. // we do not want to force-override the label/annotations
  287. // and only copy the necessary key/value pairs.
  288. func mergeMetadata(secret *v1.Secret, externalSecret esv1alpha1.ExternalSecret) {
  289. if secret.ObjectMeta.Labels == nil {
  290. secret.ObjectMeta.Labels = make(map[string]string)
  291. }
  292. if secret.ObjectMeta.Annotations == nil {
  293. secret.ObjectMeta.Annotations = make(map[string]string)
  294. }
  295. if externalSecret.Spec.Target.Template == nil {
  296. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.ObjectMeta.Labels)
  297. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.ObjectMeta.Annotations)
  298. return
  299. }
  300. // if template is defined: use those labels/annotations
  301. secret.Type = externalSecret.Spec.Target.Template.Type
  302. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.Spec.Target.Template.Metadata.Labels)
  303. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.Spec.Target.Template.Metadata.Annotations)
  304. }
  305. // getStore returns the store with the provided ExternalSecret.
  306. func (r *Reconciler) getStore(ctx context.Context, externalSecret *esv1alpha1.ExternalSecret) (esv1alpha1.GenericStore, error) {
  307. ref := types.NamespacedName{
  308. Name: externalSecret.Spec.SecretStoreRef.Name,
  309. }
  310. if externalSecret.Spec.SecretStoreRef.Kind == esv1alpha1.ClusterSecretStoreKind {
  311. var store esv1alpha1.ClusterSecretStore
  312. err := r.Get(ctx, ref, &store)
  313. if err != nil {
  314. return nil, fmt.Errorf(errGetClusterSecretStore, ref.Name, err)
  315. }
  316. return &store, nil
  317. }
  318. ref.Namespace = externalSecret.Namespace
  319. var store esv1alpha1.SecretStore
  320. err := r.Get(ctx, ref, &store)
  321. if err != nil {
  322. return nil, fmt.Errorf(errGetSecretStore, ref.Name, err)
  323. }
  324. return &store, nil
  325. }
  326. // getProviderSecretData returns the provider's secret data with the provided ExternalSecret.
  327. func (r *Reconciler) getProviderSecretData(ctx context.Context, providerClient provider.SecretsClient, externalSecret *esv1alpha1.ExternalSecret) (map[string][]byte, error) {
  328. providerData := make(map[string][]byte)
  329. for _, remoteRef := range externalSecret.Spec.DataFrom {
  330. secretMap, err := providerClient.GetSecretMap(ctx, remoteRef)
  331. if err != nil {
  332. return nil, fmt.Errorf(errGetSecretKey, remoteRef.Key, externalSecret.Name, err)
  333. }
  334. providerData = utils.MergeByteMap(providerData, secretMap)
  335. }
  336. for _, secretRef := range externalSecret.Spec.Data {
  337. secretData, err := providerClient.GetSecret(ctx, secretRef.RemoteRef)
  338. if err != nil {
  339. return nil, fmt.Errorf(errGetSecretKey, secretRef.RemoteRef.Key, externalSecret.Name, err)
  340. }
  341. providerData[secretRef.SecretKey] = secretData
  342. }
  343. return providerData, nil
  344. }
  345. func (r *Reconciler) getTemplateData(ctx context.Context, externalSecret *esv1alpha1.ExternalSecret) (map[string][]byte, error) {
  346. out := make(map[string][]byte)
  347. if externalSecret.Spec.Target.Template == nil {
  348. return out, nil
  349. }
  350. for _, tpl := range externalSecret.Spec.Target.Template.TemplateFrom {
  351. if tpl.ConfigMap != nil {
  352. var cm v1.ConfigMap
  353. err := r.Client.Get(ctx, types.NamespacedName{
  354. Name: tpl.ConfigMap.Name,
  355. Namespace: externalSecret.Namespace,
  356. }, &cm)
  357. if err != nil {
  358. return nil, err
  359. }
  360. for _, k := range tpl.ConfigMap.Items {
  361. val, ok := cm.Data[k.Key]
  362. if !ok {
  363. return nil, fmt.Errorf(errTplCMMissingKey, tpl.ConfigMap.Name, k.Key)
  364. }
  365. out[k.Key] = []byte(val)
  366. }
  367. }
  368. if tpl.Secret != nil {
  369. var sec v1.Secret
  370. err := r.Client.Get(ctx, types.NamespacedName{
  371. Name: tpl.Secret.Name,
  372. Namespace: externalSecret.Namespace,
  373. }, &sec)
  374. if err != nil {
  375. return nil, err
  376. }
  377. for _, k := range tpl.Secret.Items {
  378. val, ok := sec.Data[k.Key]
  379. if !ok {
  380. return nil, fmt.Errorf(errTplSecMissingKey, tpl.Secret.Name, k.Key)
  381. }
  382. out[k.Key] = val
  383. }
  384. }
  385. }
  386. return out, nil
  387. }
  388. // SetupWithManager returns a new controller builder that will be started by the provided Manager.
  389. func (r *Reconciler) SetupWithManager(mgr ctrl.Manager) error {
  390. return ctrl.NewControllerManagedBy(mgr).
  391. For(&esv1alpha1.ExternalSecret{}).
  392. Owns(&v1.Secret{}).
  393. Complete(r)
  394. }