externalsecret_controller_manifest.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package externalsecret
  14. import (
  15. "context"
  16. "fmt"
  17. "github.com/go-logr/logr"
  18. v1 "k8s.io/api/core/v1"
  19. apierrors "k8s.io/apimachinery/pkg/api/errors"
  20. "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
  21. "k8s.io/apimachinery/pkg/runtime/schema"
  22. "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  24. "github.com/external-secrets/external-secrets/pkg/controllers/templating"
  25. "github.com/external-secrets/external-secrets/runtime/template"
  26. )
  27. // isGenericTarget checks if the ExternalSecret targets a generic resource.
  28. func isGenericTarget(es *esv1.ExternalSecret) bool {
  29. return es.Spec.Target.Manifest != nil
  30. }
  31. // validateGenericTarget validates that generic targets are properly configured.
  32. func (r *Reconciler) validateGenericTarget(log logr.Logger, es *esv1.ExternalSecret) error {
  33. if !r.AllowGenericTargets {
  34. return fmt.Errorf("generic targets are disabled. Enable with --unsafe-allow-generic-targets flag")
  35. }
  36. manifest := es.Spec.Target.Manifest
  37. if manifest.APIVersion == "" {
  38. return fmt.Errorf("target.manifest.apiVersion is required")
  39. }
  40. if manifest.Kind == "" {
  41. return fmt.Errorf("target.manifest.kind is required")
  42. }
  43. log.Info("Warning: Using generic target. Make sure access policies and encryption are properly configured.",
  44. "apiVersion", manifest.APIVersion,
  45. "kind", manifest.Kind,
  46. "name", getTargetName(es))
  47. return nil
  48. }
  49. // getTargetGVK returns the GroupVersionKind for the target resource.
  50. func getTargetGVK(es *esv1.ExternalSecret) schema.GroupVersionKind {
  51. manifest := es.Spec.Target.Manifest
  52. gv, _ := schema.ParseGroupVersion(manifest.APIVersion)
  53. return schema.GroupVersionKind{
  54. Group: gv.Group,
  55. Version: gv.Version,
  56. Kind: manifest.Kind,
  57. }
  58. }
  59. // getTargetName returns the name of the target resource.
  60. func getTargetName(es *esv1.ExternalSecret) string {
  61. if es.Spec.Target.Name != "" {
  62. return es.Spec.Target.Name
  63. }
  64. return es.Name
  65. }
  66. // getGenericResource retrieves a generic resource using the controller-runtime client.
  67. func (r *Reconciler) getGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret) (*unstructured.Unstructured, error) {
  68. gvk := getTargetGVK(es)
  69. resource := &unstructured.Unstructured{}
  70. resource.SetGroupVersionKind(gvk)
  71. err := r.Client.Get(ctx, client.ObjectKey{
  72. Namespace: es.Namespace,
  73. Name: getTargetName(es),
  74. }, resource)
  75. if err != nil {
  76. if apierrors.IsNotFound(err) {
  77. log.V(1).Info("target resource does not exist", "gvk", gvk.String(), "name", getTargetName(es))
  78. return nil, err
  79. }
  80. return nil, fmt.Errorf("failed to get target resource: %w", err)
  81. }
  82. return resource, nil
  83. }
  84. func (r *Reconciler) createGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret, obj *unstructured.Unstructured) error {
  85. gvk := getTargetGVK(es)
  86. // Check if resource already exists
  87. existing := &unstructured.Unstructured{}
  88. existing.SetGroupVersionKind(gvk)
  89. err := r.Client.Get(ctx, client.ObjectKey{
  90. Namespace: es.Namespace,
  91. Name: getTargetName(es),
  92. }, existing)
  93. if err != nil {
  94. if !apierrors.IsNotFound(err) {
  95. return fmt.Errorf("failed to check if target resource exists: %w", err)
  96. }
  97. } else {
  98. return fmt.Errorf("target resource with name %s already exists", getTargetName(es))
  99. }
  100. log.Info("creating target resource", "gvk", gvk.String(), "name", getTargetName(es))
  101. err = r.Client.Create(ctx, obj)
  102. if err != nil {
  103. return fmt.Errorf("failed to create target resource: %w", err)
  104. }
  105. r.recorder.Event(es, v1.EventTypeNormal, "Created", fmt.Sprintf("Created %s %s", gvk.Kind, getTargetName(es)))
  106. return nil
  107. }
  108. func (r *Reconciler) updateGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret, existing *unstructured.Unstructured) error {
  109. gvk := getTargetGVK(es)
  110. log.Info("updating target resource", "gvk", gvk.String(), "name", getTargetName(es))
  111. err := r.Client.Update(ctx, existing)
  112. if err != nil {
  113. return fmt.Errorf("failed to update target resource: %w", err)
  114. }
  115. r.recorder.Event(es, v1.EventTypeNormal, "Updated", fmt.Sprintf("Updated %s %s", gvk.Kind, getTargetName(es)))
  116. return nil
  117. }
  118. // deleteGenericResource deletes a generic resource.
  119. func (r *Reconciler) deleteGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret) error {
  120. if !r.AllowGenericTargets || !isGenericTarget(es) {
  121. return nil
  122. }
  123. gvk := getTargetGVK(es)
  124. obj := &unstructured.Unstructured{}
  125. obj.SetGroupVersionKind(gvk)
  126. obj.SetNamespace(es.Namespace)
  127. obj.SetName(getTargetName(es))
  128. log.Info("deleting target resource", "gvk", gvk.String(), "name", getTargetName(es))
  129. err := r.Client.Delete(ctx, obj)
  130. if err != nil && !apierrors.IsNotFound(err) {
  131. return fmt.Errorf("failed to delete target resource: %w", err)
  132. }
  133. r.recorder.Event(es, v1.EventTypeNormal, "Deleted", fmt.Sprintf("Deleted %s %s", gvk.Kind, getTargetName(es)))
  134. return nil
  135. }
  136. // applyTemplateToManifest renders templates for generic resources and returns an unstructured object.
  137. // If existingObj is provided, templates will be applied to it (for merge behavior).
  138. // Otherwise, a new object is created.
  139. func (r *Reconciler) applyTemplateToManifest(ctx context.Context, es *esv1.ExternalSecret, dataMap map[string][]byte, existingObj *unstructured.Unstructured) (*unstructured.Unstructured, error) {
  140. var obj *unstructured.Unstructured
  141. if existingObj != nil {
  142. // use the existing object for merge behavior if it exists
  143. obj = existingObj.DeepCopy()
  144. } else {
  145. gvk := getTargetGVK(es)
  146. obj = &unstructured.Unstructured{}
  147. obj.SetGroupVersionKind(gvk)
  148. obj.SetName(getTargetName(es))
  149. obj.SetNamespace(es.Namespace)
  150. switch gvk.Kind {
  151. case "ConfigMap", "Secret":
  152. obj.Object["data"] = map[string]interface{}{}
  153. default:
  154. obj.Object["spec"] = map[string]interface{}{}
  155. }
  156. }
  157. labels := obj.GetLabels()
  158. if labels == nil {
  159. labels = make(map[string]string)
  160. }
  161. annotations := obj.GetAnnotations()
  162. if annotations == nil {
  163. annotations = make(map[string]string)
  164. }
  165. if es.Spec.Target.Template != nil {
  166. for k, v := range es.Spec.Target.Template.Metadata.Labels {
  167. labels[k] = v
  168. }
  169. for k, v := range es.Spec.Target.Template.Metadata.Annotations {
  170. annotations[k] = v
  171. }
  172. }
  173. labels[esv1.LabelManaged] = esv1.LabelManagedValue
  174. obj.SetLabels(labels)
  175. obj.SetAnnotations(annotations)
  176. var result *unstructured.Unstructured
  177. var err error
  178. if es.Spec.Target.Template == nil {
  179. result = r.createSimpleManifest(obj, dataMap)
  180. } else {
  181. result, err = r.renderTemplatedManifest(ctx, es, obj, dataMap)
  182. }
  183. if err != nil {
  184. return nil, err
  185. }
  186. ann := result.GetAnnotations()
  187. if ann == nil {
  188. ann = make(map[string]string)
  189. }
  190. hash, err := genericTargetContentHash(result)
  191. if err != nil {
  192. return nil, fmt.Errorf("failed to hash target %q content: %w", es.Spec.Target.Name, err)
  193. }
  194. ann[esv1.AnnotationDataHash] = hash
  195. result.SetAnnotations(ann)
  196. return result, nil
  197. }
  198. // createSimpleManifest creates a simple resource without templates (e.g., ConfigMap with data field).
  199. func (r *Reconciler) createSimpleManifest(obj *unstructured.Unstructured, dataMap map[string][]byte) *unstructured.Unstructured {
  200. // For ConfigMaps and similar resources, put data in .data field
  201. if obj.GetKind() == "ConfigMap" {
  202. data := make(map[string]string)
  203. for k, v := range dataMap {
  204. data[k] = string(v)
  205. }
  206. obj.Object["data"] = data
  207. return obj
  208. }
  209. // For other resources, put in spec.data or just data
  210. data := make(map[string]string)
  211. for k, v := range dataMap {
  212. data[k] = string(v)
  213. }
  214. if obj.Object["spec"] == nil {
  215. obj.Object["spec"] = make(map[string]any)
  216. }
  217. spec := obj.Object["spec"].(map[string]any)
  218. spec["data"] = data
  219. return obj
  220. }
  221. // renderTemplatedManifest renders templates for a custom resource.
  222. func (r *Reconciler) renderTemplatedManifest(ctx context.Context, es *esv1.ExternalSecret, obj *unstructured.Unstructured, dataMap map[string][]byte) (*unstructured.Unstructured, error) {
  223. execute, err := template.EngineForVersion(es.Spec.Target.Template.EngineVersion)
  224. if err != nil {
  225. return nil, fmt.Errorf("failed to get template engine: %w", err)
  226. }
  227. // Handle templateFrom entries
  228. for _, tplFrom := range es.Spec.Target.Template.TemplateFrom {
  229. targetPath := tplFrom.Target
  230. if targetPath == "" {
  231. targetPath = esv1.TemplateTargetData
  232. }
  233. if tplFrom.Literal != nil {
  234. // Execute template directly against the unstructured object
  235. out := make(map[string][]byte)
  236. out[*tplFrom.Literal] = []byte(*tplFrom.Literal)
  237. if err := execute(out, dataMap, esv1.TemplateScopeKeysAndValues, targetPath, obj); err != nil {
  238. return nil, fmt.Errorf("failed to execute literal template: %w", err)
  239. }
  240. }
  241. if tplFrom.ConfigMap != nil || tplFrom.Secret != nil {
  242. // Parser still uses v1.Secret, so collect data and apply via template engine to the end result.
  243. tempSecret := &v1.Secret{Data: make(map[string][]byte)}
  244. p := templating.Parser{
  245. Client: r.Client,
  246. TargetSecret: tempSecret,
  247. DataMap: dataMap,
  248. Exec: execute,
  249. }
  250. if tplFrom.ConfigMap != nil {
  251. if err := p.MergeConfigMap(ctx, es.Namespace, tplFrom); err != nil {
  252. return nil, fmt.Errorf("failed to merge configmap template: %w", err)
  253. }
  254. }
  255. if tplFrom.Secret != nil {
  256. if err := p.MergeSecret(ctx, es.Namespace, tplFrom); err != nil {
  257. return nil, fmt.Errorf("failed to merge secret template: %w", err)
  258. }
  259. }
  260. // apply collected data to the target object
  261. if err := execute(tempSecret.Data, dataMap, esv1.TemplateScopeValues, targetPath, obj); err != nil {
  262. return nil, fmt.Errorf("failed to apply merged templates to path %s: %w", targetPath, err)
  263. }
  264. }
  265. }
  266. // Handle template.data entries
  267. if len(es.Spec.Target.Template.Data) > 0 {
  268. tplMap := make(map[string][]byte)
  269. for k, v := range es.Spec.Target.Template.Data {
  270. tplMap[k] = []byte(v)
  271. }
  272. if err := execute(tplMap, dataMap, esv1.TemplateScopeValues, esv1.TemplateTargetData, obj); err != nil {
  273. return nil, fmt.Errorf("failed to execute template.data: %w", err)
  274. }
  275. }
  276. return obj, nil
  277. }