externalsecret_controller_template.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package externalsecret
  13. import (
  14. "context"
  15. "fmt"
  16. v1 "k8s.io/api/core/v1"
  17. "k8s.io/apimachinery/pkg/types"
  18. "sigs.k8s.io/controller-runtime/pkg/client"
  19. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  20. // Loading registered providers.
  21. _ "github.com/external-secrets/external-secrets/pkg/provider/register"
  22. "github.com/external-secrets/external-secrets/pkg/template"
  23. utils "github.com/external-secrets/external-secrets/pkg/utils"
  24. )
  25. // merge template in the following order:
  26. // * template.Data (highest precedence)
  27. // * template.templateFrom
  28. // * secret via es.data or es.dataFrom.
  29. func (r *Reconciler) applyTemplate(ctx context.Context, es *esv1beta1.ExternalSecret, secret *v1.Secret, dataMap map[string][]byte) error {
  30. mergeMetadata(secret, es)
  31. // no template: copy data and return
  32. if es.Spec.Target.Template == nil {
  33. secret.Data = dataMap
  34. secret.Annotations[esv1beta1.AnnotationDataHash] = utils.ObjectHash(secret.Data)
  35. return nil
  36. }
  37. // fetch templates defined in template.templateFrom
  38. tplMap, err := r.getTemplateData(ctx, es)
  39. if err != nil {
  40. return fmt.Errorf(errFetchTplFrom, err)
  41. }
  42. // explicitly defined template.Data takes precedence over templateFrom
  43. for k, v := range es.Spec.Target.Template.Data {
  44. tplMap[k] = []byte(v)
  45. }
  46. r.Log.V(1).Info("found template data", "tpl_data", tplMap)
  47. execute, err := template.EngineForVersion(es.Spec.Target.Template.EngineVersion)
  48. if err != nil {
  49. return err
  50. }
  51. err = execute(tplMap, dataMap, secret)
  52. if err != nil {
  53. return fmt.Errorf(errExecTpl, err)
  54. }
  55. // if no data was provided by template fallback
  56. // to value from the provider
  57. if len(es.Spec.Target.Template.Data) == 0 && len(es.Spec.Target.Template.TemplateFrom) == 0 {
  58. secret.Data = dataMap
  59. }
  60. secret.Annotations[esv1beta1.AnnotationDataHash] = utils.ObjectHash(secret.Data)
  61. return nil
  62. }
  63. // we do not want to force-override the label/annotations
  64. // and only copy the necessary key/value pairs.
  65. func mergeMetadata(secret *v1.Secret, externalSecret *esv1beta1.ExternalSecret) {
  66. if secret.ObjectMeta.Labels == nil {
  67. secret.ObjectMeta.Labels = make(map[string]string)
  68. }
  69. if secret.ObjectMeta.Annotations == nil {
  70. secret.ObjectMeta.Annotations = make(map[string]string)
  71. }
  72. if externalSecret.Spec.Target.Template == nil {
  73. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.ObjectMeta.Labels)
  74. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.ObjectMeta.Annotations)
  75. return
  76. }
  77. // if template is defined: use those labels/annotations
  78. secret.Type = externalSecret.Spec.Target.Template.Type
  79. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.Spec.Target.Template.Metadata.Labels)
  80. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.Spec.Target.Template.Metadata.Annotations)
  81. }
  82. func (r *Reconciler) getTemplateData(ctx context.Context, externalSecret *esv1beta1.ExternalSecret) (map[string][]byte, error) {
  83. out := make(map[string][]byte)
  84. if externalSecret.Spec.Target.Template == nil {
  85. return out, nil
  86. }
  87. for _, tpl := range externalSecret.Spec.Target.Template.TemplateFrom {
  88. err := mergeConfigMap(ctx, r.Client, externalSecret, tpl, out)
  89. if err != nil {
  90. return nil, err
  91. }
  92. err = mergeSecret(ctx, r.Client, externalSecret, tpl, out)
  93. if err != nil {
  94. return nil, err
  95. }
  96. }
  97. return out, nil
  98. }
  99. func mergeConfigMap(ctx context.Context, k8sClient client.Client, es *esv1beta1.ExternalSecret, tpl esv1beta1.TemplateFrom, out map[string][]byte) error {
  100. if tpl.ConfigMap == nil {
  101. return nil
  102. }
  103. var cm v1.ConfigMap
  104. err := k8sClient.Get(ctx, types.NamespacedName{
  105. Name: tpl.ConfigMap.Name,
  106. Namespace: es.Namespace,
  107. }, &cm)
  108. if err != nil {
  109. return err
  110. }
  111. for _, k := range tpl.ConfigMap.Items {
  112. val, ok := cm.Data[k.Key]
  113. if !ok {
  114. return fmt.Errorf(errTplCMMissingKey, tpl.ConfigMap.Name, k.Key)
  115. }
  116. out[k.Key] = []byte(val)
  117. }
  118. return nil
  119. }
  120. func mergeSecret(ctx context.Context, k8sClient client.Client, es *esv1beta1.ExternalSecret, tpl esv1beta1.TemplateFrom, out map[string][]byte) error {
  121. if tpl.Secret == nil {
  122. return nil
  123. }
  124. var sec v1.Secret
  125. err := k8sClient.Get(ctx, types.NamespacedName{
  126. Name: tpl.Secret.Name,
  127. Namespace: es.Namespace,
  128. }, &sec)
  129. if err != nil {
  130. return err
  131. }
  132. for _, k := range tpl.Secret.Items {
  133. val, ok := sec.Data[k.Key]
  134. if !ok {
  135. return fmt.Errorf(errTplSecMissingKey, tpl.Secret.Name, k.Key)
  136. }
  137. out[k.Key] = val
  138. }
  139. return nil
  140. }