| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package externalsecret
- import (
- "context"
- "fmt"
- v1 "k8s.io/api/core/v1"
- "k8s.io/apimachinery/pkg/types"
- "sigs.k8s.io/controller-runtime/pkg/client"
- esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
- // Loading registered providers.
- _ "github.com/external-secrets/external-secrets/pkg/provider/register"
- "github.com/external-secrets/external-secrets/pkg/template"
- "github.com/external-secrets/external-secrets/pkg/utils"
- )
- type Parser struct {
- exec template.ExecFunc
- dataMap map[string][]byte
- client client.Client
- targetSecret *v1.Secret
- }
- func (p *Parser) MergeConfigMap(ctx context.Context, namespace string, tpl esv1beta1.TemplateFrom) error {
- if tpl.ConfigMap == nil {
- return nil
- }
- var cm v1.ConfigMap
- err := p.client.Get(ctx, types.NamespacedName{
- Name: tpl.ConfigMap.Name,
- Namespace: namespace,
- }, &cm)
- if err != nil {
- return err
- }
- for _, k := range tpl.ConfigMap.Items {
- val, ok := cm.Data[k.Key]
- out := make(map[string][]byte)
- if !ok {
- return fmt.Errorf(errTplCMMissingKey, tpl.ConfigMap.Name, k.Key)
- }
- switch k.TemplateAs {
- case esv1beta1.TemplateScopeValues:
- out[k.Key] = []byte(val)
- case esv1beta1.TemplateScopeKeysAndValues:
- out[val] = []byte(val)
- }
- err = p.exec(out, p.dataMap, k.TemplateAs, tpl.Target, p.targetSecret)
- if err != nil {
- return err
- }
- }
- return nil
- }
- func (p *Parser) MergeSecret(ctx context.Context, namespace string, tpl esv1beta1.TemplateFrom) error {
- if tpl.Secret == nil {
- return nil
- }
- var sec v1.Secret
- err := p.client.Get(ctx, types.NamespacedName{
- Name: tpl.Secret.Name,
- Namespace: namespace,
- }, &sec)
- if err != nil {
- return err
- }
- for _, k := range tpl.Secret.Items {
- val, ok := sec.Data[k.Key]
- if !ok {
- return fmt.Errorf(errTplSecMissingKey, tpl.Secret.Name, k.Key)
- }
- out := make(map[string][]byte)
- switch k.TemplateAs {
- case esv1beta1.TemplateScopeValues:
- out[k.Key] = val
- case esv1beta1.TemplateScopeKeysAndValues:
- out[string(val)] = val
- }
- err = p.exec(out, p.dataMap, k.TemplateAs, tpl.Target, p.targetSecret)
- if err != nil {
- return err
- }
- }
- return nil
- }
- func (p *Parser) MergeLiteral(_ context.Context, tpl esv1beta1.TemplateFrom) error {
- if tpl.Literal == nil {
- return nil
- }
- out := make(map[string][]byte)
- out[*tpl.Literal] = []byte(*tpl.Literal)
- return p.exec(out, p.dataMap, esv1beta1.TemplateScopeKeysAndValues, tpl.Target, p.targetSecret)
- }
- func (p *Parser) MergeTemplateFrom(ctx context.Context, es *esv1beta1.ExternalSecret) error {
- if es.Spec.Target.Template == nil {
- return nil
- }
- for _, tpl := range es.Spec.Target.Template.TemplateFrom {
- err := p.MergeConfigMap(ctx, es.Namespace, tpl)
- if err != nil {
- return err
- }
- err = p.MergeSecret(ctx, es.Namespace, tpl)
- if err != nil {
- return err
- }
- err = p.MergeLiteral(ctx, tpl)
- if err != nil {
- return err
- }
- }
- return nil
- }
- func (p *Parser) MergeMap(tplMap map[string]string, target esv1beta1.TemplateTarget) error {
- byteMap := make(map[string][]byte)
- for k, v := range tplMap {
- byteMap[k] = []byte(v)
- }
- err := p.exec(byteMap, p.dataMap, esv1beta1.TemplateScopeValues, target, p.targetSecret)
- if err != nil {
- return fmt.Errorf(errExecTpl, err)
- }
- return nil
- }
- // merge template in the following order:
- // * template.Data (highest precedence)
- // * template.templateFrom
- // * secret via es.data or es.dataFrom.
- func (r *Reconciler) applyTemplate(ctx context.Context, es *esv1beta1.ExternalSecret, secret *v1.Secret, dataMap map[string][]byte) error {
- setMetadata(secret, es)
- // no template: copy data and return
- if es.Spec.Target.Template == nil {
- secret.Data = dataMap
- return nil
- }
- // Merge Policy should merge secrets
- if es.Spec.Target.Template.MergePolicy == esv1beta1.MergePolicyMerge {
- for k, v := range dataMap {
- secret.Data[k] = v
- }
- }
- execute, err := template.EngineForVersion(es.Spec.Target.Template.EngineVersion)
- if err != nil {
- return err
- }
- p := Parser{
- client: r.Client,
- targetSecret: secret,
- dataMap: dataMap,
- exec: execute,
- }
- // apply templates defined in template.templateFrom
- err = p.MergeTemplateFrom(ctx, es)
- if err != nil {
- return fmt.Errorf(errFetchTplFrom, err)
- }
- // explicitly defined template.Data takes precedence over templateFrom
- err = p.MergeMap(es.Spec.Target.Template.Data, esv1beta1.TemplateTargetData)
- if err != nil {
- return fmt.Errorf(errExecTpl, err)
- }
- // get template data for labels
- err = p.MergeMap(es.Spec.Target.Template.Metadata.Labels, esv1beta1.TemplateTargetLabels)
- if err != nil {
- return fmt.Errorf(errExecTpl, err)
- }
- // get template data for annotations
- err = p.MergeMap(es.Spec.Target.Template.Metadata.Annotations, esv1beta1.TemplateTargetAnnotations)
- if err != nil {
- return fmt.Errorf(errExecTpl, err)
- }
- // if no data was provided by template fallback
- // to value from the provider
- if len(es.Spec.Target.Template.Data) == 0 && len(es.Spec.Target.Template.TemplateFrom) == 0 {
- secret.Data = dataMap
- }
- return nil
- }
- // setMetadata sets Labels and Annotations to the given secret.
- func setMetadata(secret *v1.Secret, externalSecret *esv1beta1.ExternalSecret) {
- // It is safe to override the metadata since the Server-Side Apply merges those fields if necessary
- secret.ObjectMeta.Labels = make(map[string]string)
- secret.ObjectMeta.Annotations = make(map[string]string)
- if externalSecret.Spec.Target.Template == nil {
- utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.ObjectMeta.Labels)
- utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.ObjectMeta.Annotations)
- return
- }
- // if template is defined: use those labels/annotations
- secret.Type = externalSecret.Spec.Target.Template.Type
- utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.Spec.Target.Template.Metadata.Labels)
- utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.Spec.Target.Template.Metadata.Annotations)
- }
|