externalsecret_controller_manifest.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package externalsecret
  14. import (
  15. "context"
  16. "fmt"
  17. "github.com/go-logr/logr"
  18. v1 "k8s.io/api/core/v1"
  19. apierrors "k8s.io/apimachinery/pkg/api/errors"
  20. "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
  21. "k8s.io/apimachinery/pkg/runtime/schema"
  22. "sigs.k8s.io/controller-runtime/pkg/client"
  23. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  24. "github.com/external-secrets/external-secrets/pkg/controllers/templating"
  25. "github.com/external-secrets/external-secrets/runtime/template"
  26. )
  27. // isGenericTarget checks if the ExternalSecret targets a generic resource.
  28. func isGenericTarget(es *esv1.ExternalSecret) bool {
  29. return es.Spec.Target.Manifest != nil
  30. }
  31. // validateGenericTarget validates that generic targets are properly configured.
  32. func (r *Reconciler) validateGenericTarget(log logr.Logger, es *esv1.ExternalSecret) error {
  33. if !r.AllowGenericTargets {
  34. return fmt.Errorf("generic targets are disabled. Enable with --unsafe-allow-generic-targets flag")
  35. }
  36. manifest := es.Spec.Target.Manifest
  37. if manifest.APIVersion == "" {
  38. return fmt.Errorf("target.manifest.apiVersion is required")
  39. }
  40. if manifest.Kind == "" {
  41. return fmt.Errorf("target.manifest.kind is required")
  42. }
  43. log.Info("Warning: Using generic target. Make sure access policies and encryption are properly configured.",
  44. "apiVersion", manifest.APIVersion,
  45. "kind", manifest.Kind,
  46. "name", getTargetName(es))
  47. return nil
  48. }
  49. // getTargetGVK returns the GroupVersionKind for the target resource.
  50. func getTargetGVK(es *esv1.ExternalSecret) schema.GroupVersionKind {
  51. manifest := es.Spec.Target.Manifest
  52. gv, _ := schema.ParseGroupVersion(manifest.APIVersion)
  53. return schema.GroupVersionKind{
  54. Group: gv.Group,
  55. Version: gv.Version,
  56. Kind: manifest.Kind,
  57. }
  58. }
  59. // getTargetName returns the name of the target resource.
  60. func getTargetName(es *esv1.ExternalSecret) string {
  61. if es.Spec.Target.Name != "" {
  62. return es.Spec.Target.Name
  63. }
  64. return es.Name
  65. }
  66. // getGenericResource retrieves a generic resource using the controller-runtime client.
  67. func (r *Reconciler) getGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret) (*unstructured.Unstructured, error) {
  68. gvk := getTargetGVK(es)
  69. resource := &unstructured.Unstructured{}
  70. resource.SetGroupVersionKind(gvk)
  71. err := r.Client.Get(ctx, client.ObjectKey{
  72. Namespace: es.Namespace,
  73. Name: getTargetName(es),
  74. }, resource)
  75. if err != nil {
  76. if apierrors.IsNotFound(err) {
  77. log.V(1).Info("target resource does not exist", "gvk", gvk.String(), "name", getTargetName(es))
  78. return nil, err
  79. }
  80. return nil, fmt.Errorf("failed to get target resource: %w", err)
  81. }
  82. return resource, nil
  83. }
  84. func (r *Reconciler) createGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret, obj *unstructured.Unstructured) error {
  85. gvk := getTargetGVK(es)
  86. // Check if resource already exists
  87. existing := &unstructured.Unstructured{}
  88. existing.SetGroupVersionKind(gvk)
  89. err := r.Client.Get(ctx, client.ObjectKey{
  90. Namespace: es.Namespace,
  91. Name: getTargetName(es),
  92. }, existing)
  93. if err != nil {
  94. if !apierrors.IsNotFound(err) {
  95. return fmt.Errorf("failed to check if target resource exists: %w", err)
  96. }
  97. } else {
  98. return fmt.Errorf("target resource with name %s already exists", getTargetName(es))
  99. }
  100. log.Info("creating target resource", "gvk", gvk.String(), "name", getTargetName(es))
  101. err = r.Client.Create(ctx, obj)
  102. if err != nil {
  103. return fmt.Errorf("failed to create target resource: %w", err)
  104. }
  105. r.recorder.Event(es, v1.EventTypeNormal, "Created", fmt.Sprintf("Created %s %s", gvk.Kind, getTargetName(es)))
  106. return nil
  107. }
  108. func (r *Reconciler) updateGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret, existing *unstructured.Unstructured) error {
  109. gvk := getTargetGVK(es)
  110. log.Info("updating target resource", "gvk", gvk.String(), "name", getTargetName(es))
  111. err := r.Client.Update(ctx, existing)
  112. if err != nil {
  113. return fmt.Errorf("failed to update target resource: %w", err)
  114. }
  115. r.recorder.Event(es, v1.EventTypeNormal, "Updated", fmt.Sprintf("Updated %s %s", gvk.Kind, getTargetName(es)))
  116. return nil
  117. }
  118. // deleteGenericResource deletes a generic resource.
  119. func (r *Reconciler) deleteGenericResource(ctx context.Context, log logr.Logger, es *esv1.ExternalSecret) error {
  120. if !r.AllowGenericTargets || !isGenericTarget(es) {
  121. return nil
  122. }
  123. gvk := getTargetGVK(es)
  124. obj := &unstructured.Unstructured{}
  125. obj.SetGroupVersionKind(gvk)
  126. obj.SetNamespace(es.Namespace)
  127. obj.SetName(getTargetName(es))
  128. log.Info("deleting target resource", "gvk", gvk.String(), "name", getTargetName(es))
  129. err := r.Client.Delete(ctx, obj)
  130. if err != nil && !apierrors.IsNotFound(err) {
  131. return fmt.Errorf("failed to delete target resource: %w", err)
  132. }
  133. r.recorder.Event(es, v1.EventTypeNormal, "Deleted", fmt.Sprintf("Deleted %s %s", gvk.Kind, getTargetName(es)))
  134. return nil
  135. }
  136. // applyTemplateToManifest renders templates for generic resources and returns an unstructured object.
  137. // If existingObj is provided, templates will be applied to it (for merge behavior).
  138. // Otherwise, a new object is created.
  139. func (r *Reconciler) applyTemplateToManifest(ctx context.Context, es *esv1.ExternalSecret, dataMap map[string][]byte, existingObj *unstructured.Unstructured) (*unstructured.Unstructured, error) {
  140. var obj *unstructured.Unstructured
  141. if existingObj != nil {
  142. // use the existing object for merge behavior if it exists
  143. obj = existingObj.DeepCopy()
  144. } else {
  145. gvk := getTargetGVK(es)
  146. obj = &unstructured.Unstructured{}
  147. obj.SetGroupVersionKind(gvk)
  148. obj.SetName(getTargetName(es))
  149. obj.SetNamespace(es.Namespace)
  150. }
  151. labels := obj.GetLabels()
  152. if labels == nil {
  153. labels = make(map[string]string)
  154. }
  155. annotations := obj.GetAnnotations()
  156. if annotations == nil {
  157. annotations = make(map[string]string)
  158. }
  159. if es.Spec.Target.Template != nil {
  160. for k, v := range es.Spec.Target.Template.Metadata.Labels {
  161. labels[k] = v
  162. }
  163. for k, v := range es.Spec.Target.Template.Metadata.Annotations {
  164. annotations[k] = v
  165. }
  166. }
  167. labels[esv1.LabelManaged] = esv1.LabelManagedValue
  168. obj.SetLabels(labels)
  169. obj.SetAnnotations(annotations)
  170. if es.Spec.Target.Template == nil {
  171. return r.createSimpleManifest(obj, dataMap)
  172. }
  173. return r.renderTemplatedManifest(ctx, es, obj, dataMap)
  174. }
  175. // createSimpleManifest creates a simple resource without templates (e.g., ConfigMap with data field).
  176. func (r *Reconciler) createSimpleManifest(obj *unstructured.Unstructured, dataMap map[string][]byte) (*unstructured.Unstructured, error) {
  177. // For ConfigMaps and similar resources, put data in .data field
  178. if obj.GetKind() == "ConfigMap" {
  179. data := make(map[string]string)
  180. for k, v := range dataMap {
  181. data[k] = string(v)
  182. }
  183. obj.Object["data"] = data
  184. return obj, nil
  185. }
  186. // For other resources, put in spec.data or just data
  187. data := make(map[string]string)
  188. for k, v := range dataMap {
  189. data[k] = string(v)
  190. }
  191. if obj.Object["spec"] == nil {
  192. obj.Object["spec"] = make(map[string]any)
  193. }
  194. spec := obj.Object["spec"].(map[string]any)
  195. spec["data"] = data
  196. return obj, nil
  197. }
  198. // renderTemplatedManifest renders templates for a custom resource.
  199. func (r *Reconciler) renderTemplatedManifest(ctx context.Context, es *esv1.ExternalSecret, obj *unstructured.Unstructured, dataMap map[string][]byte) (*unstructured.Unstructured, error) {
  200. execute, err := template.EngineForVersion(es.Spec.Target.Template.EngineVersion)
  201. if err != nil {
  202. return nil, fmt.Errorf("failed to get template engine: %w", err)
  203. }
  204. // Handle templateFrom entries
  205. for _, tplFrom := range es.Spec.Target.Template.TemplateFrom {
  206. targetPath := tplFrom.Target
  207. if targetPath == "" {
  208. targetPath = esv1.TemplateTargetData
  209. }
  210. if tplFrom.Literal != nil {
  211. // Execute template directly against the unstructured object
  212. out := make(map[string][]byte)
  213. out[*tplFrom.Literal] = []byte(*tplFrom.Literal)
  214. if err := execute(out, dataMap, esv1.TemplateScopeKeysAndValues, targetPath, obj); err != nil {
  215. return nil, fmt.Errorf("failed to execute literal template: %w", err)
  216. }
  217. }
  218. if tplFrom.ConfigMap != nil || tplFrom.Secret != nil {
  219. // Parser still uses v1.Secret, so collect data and apply via template engine to the end result.
  220. tempSecret := &v1.Secret{Data: make(map[string][]byte)}
  221. p := templating.Parser{
  222. Client: r.Client,
  223. TargetSecret: tempSecret,
  224. DataMap: dataMap,
  225. Exec: execute,
  226. }
  227. if tplFrom.ConfigMap != nil {
  228. if err := p.MergeConfigMap(ctx, es.Namespace, tplFrom); err != nil {
  229. return nil, fmt.Errorf("failed to merge configmap template: %w", err)
  230. }
  231. }
  232. if tplFrom.Secret != nil {
  233. if err := p.MergeSecret(ctx, es.Namespace, tplFrom); err != nil {
  234. return nil, fmt.Errorf("failed to merge secret template: %w", err)
  235. }
  236. }
  237. // apply collected data to the target object
  238. if err := execute(tempSecret.Data, dataMap, esv1.TemplateScopeValues, targetPath, obj); err != nil {
  239. return nil, fmt.Errorf("failed to apply merged templates to path %s: %w", targetPath, err)
  240. }
  241. }
  242. }
  243. // Handle template.data entries
  244. if len(es.Spec.Target.Template.Data) > 0 {
  245. tplMap := make(map[string][]byte)
  246. for k, v := range es.Spec.Target.Template.Data {
  247. tplMap[k] = []byte(v)
  248. }
  249. if err := execute(tplMap, dataMap, esv1.TemplateScopeValues, esv1.TemplateTargetData, obj); err != nil {
  250. return nil, fmt.Errorf("failed to execute template.data: %w", err)
  251. }
  252. }
  253. return obj, nil
  254. }