generator.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package resolvers
  13. import (
  14. "context"
  15. "fmt"
  16. "reflect"
  17. apiextensions "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
  18. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  19. "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
  20. "k8s.io/apimachinery/pkg/runtime"
  21. "k8s.io/apimachinery/pkg/runtime/schema"
  22. "k8s.io/apimachinery/pkg/types"
  23. "sigs.k8s.io/controller-runtime/pkg/client"
  24. "sigs.k8s.io/controller-runtime/pkg/reconcile"
  25. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  26. genv1alpha1 "github.com/external-secrets/external-secrets/apis/generators/v1alpha1"
  27. )
  28. // these errors are explicitly defined so we can detect them with `errors.Is()`.
  29. var (
  30. // ErrUnableToGetGenerator is returned when a generator reference cannot be resolved.
  31. ErrUnableToGetGenerator = fmt.Errorf("unable to get generator")
  32. )
  33. // GeneratorRef resolves a generator reference to a generator implementation.
  34. func GeneratorRef(ctx context.Context, cl client.Client, scheme *runtime.Scheme, namespace string, generatorRef *esv1.GeneratorRef) (genv1alpha1.Generator, *apiextensions.JSON, error) {
  35. generator, jsonObj, err := getGenerator(ctx, cl, scheme, namespace, generatorRef)
  36. if err != nil {
  37. return nil, nil, fmt.Errorf("%w: %w", ErrUnableToGetGenerator, err)
  38. }
  39. return generator, jsonObj, nil
  40. }
  41. func getGenerator(ctx context.Context, cl client.Client, scheme *runtime.Scheme, namespace string, generatorRef *esv1.GeneratorRef) (genv1alpha1.Generator, *apiextensions.JSON, error) {
  42. // get a GVK from the generatorRef
  43. gv, err := schema.ParseGroupVersion(generatorRef.APIVersion)
  44. if err != nil {
  45. return nil, nil, reconcile.TerminalError(fmt.Errorf("generatorRef has invalid APIVersion: %w", err))
  46. }
  47. gvk := schema.GroupVersionKind{
  48. Group: gv.Group,
  49. Version: gv.Version,
  50. Kind: generatorRef.Kind,
  51. }
  52. // fail if the GVK does not use the generator group
  53. if gvk.Group != genv1alpha1.Group {
  54. return nil, nil, reconcile.TerminalError(fmt.Errorf("generatorRef may only reference the generators group, but got %s", gvk.Group))
  55. }
  56. // get a client Object from the GVK
  57. t, exists := scheme.AllKnownTypes()[gvk]
  58. if !exists {
  59. return nil, nil, reconcile.TerminalError(fmt.Errorf("generatorRef references unknown GVK %s", gvk))
  60. }
  61. obj := reflect.New(t).Interface().(client.Object)
  62. // this interface provides the Generate() method used by the controller
  63. // NOTE: all instances of a generator kind use the same instance of this interface
  64. var generator genv1alpha1.Generator
  65. // ClusterGenerator is a special case because it's a cluster-scoped resource
  66. // to use it, we create a "virtual" namespaced generator for the current namespace, as if one existed in the API
  67. if gvk.Kind == genv1alpha1.ClusterGeneratorKind {
  68. clusterGenerator := obj.(*genv1alpha1.ClusterGenerator)
  69. // get the cluster generator resource from the API
  70. // NOTE: it's important that we use the structured client so we use the cache
  71. err = cl.Get(ctx, client.ObjectKey{Name: generatorRef.Name}, clusterGenerator)
  72. if err != nil {
  73. return nil, nil, err
  74. }
  75. // convert the cluster generator to a virtual namespaced generator object
  76. obj, err = clusterGeneratorToVirtual(clusterGenerator)
  77. if err != nil {
  78. return nil, nil, reconcile.TerminalError(fmt.Errorf("invalid ClusterGenerator: %w", err))
  79. }
  80. // get the generator interface
  81. var ok bool
  82. generator, ok = genv1alpha1.GetGeneratorByName(string(clusterGenerator.Spec.Kind))
  83. if !ok {
  84. return nil, nil, reconcile.TerminalError(fmt.Errorf("ClusterGenerator has unknown kind %s", clusterGenerator.Spec.Kind))
  85. }
  86. } else {
  87. // get the generator resource from the API
  88. // NOTE: it's important that we use the structured client so we use the cache
  89. err = cl.Get(ctx, types.NamespacedName{
  90. Name: generatorRef.Name,
  91. Namespace: namespace,
  92. }, obj)
  93. if err != nil {
  94. return nil, nil, err
  95. }
  96. // get the generator interface
  97. var ok bool
  98. generator, ok = genv1alpha1.GetGeneratorByName(gvk.Kind)
  99. if !ok {
  100. return nil, nil, reconcile.TerminalError(fmt.Errorf("generatorRef has unknown kind %s", gvk.Kind))
  101. }
  102. }
  103. // convert the generator to unstructured object
  104. u := &unstructured.Unstructured{}
  105. u.Object, err = runtime.DefaultUnstructuredConverter.ToUnstructured(obj)
  106. if err != nil {
  107. return nil, nil, err
  108. }
  109. // convert the unstructured object to JSON
  110. // NOTE: we do this for backwards compatibility with how this API works, not because it's a good idea
  111. // we should refactor the generator API to use the normal typed objects
  112. jsonObj, err := u.MarshalJSON()
  113. if err != nil {
  114. return nil, nil, err
  115. }
  116. return generator, &apiextensions.JSON{Raw: jsonObj}, nil
  117. }
  118. // clusterGeneratorToVirtual converts a ClusterGenerator to a "virtual" namespaced generator that doesn't actually exist in the API.
  119. func clusterGeneratorToVirtual(gen *genv1alpha1.ClusterGenerator) (client.Object, error) {
  120. switch gen.Spec.Kind {
  121. case genv1alpha1.GeneratorKindACRAccessToken:
  122. if gen.Spec.Generator.ACRAccessTokenSpec == nil {
  123. return nil, fmt.Errorf("when kind is %s, ACRAccessTokenSpec must be set", gen.Spec.Kind)
  124. }
  125. return &genv1alpha1.ACRAccessToken{
  126. TypeMeta: metav1.TypeMeta{
  127. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  128. Kind: genv1alpha1.ACRAccessTokenKind,
  129. },
  130. Spec: *gen.Spec.Generator.ACRAccessTokenSpec,
  131. }, nil
  132. case genv1alpha1.GeneratorKindECRAuthorizationToken:
  133. if gen.Spec.Generator.ECRAuthorizationTokenSpec == nil {
  134. return nil, fmt.Errorf("when kind is %s, ECRAuthorizationTokenSpec must be set", gen.Spec.Kind)
  135. }
  136. return &genv1alpha1.ECRAuthorizationToken{
  137. TypeMeta: metav1.TypeMeta{
  138. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  139. Kind: genv1alpha1.ECRAuthorizationTokenKind,
  140. },
  141. Spec: *gen.Spec.Generator.ECRAuthorizationTokenSpec,
  142. }, nil
  143. case genv1alpha1.GeneratorKindFake:
  144. if gen.Spec.Generator.FakeSpec == nil {
  145. return nil, fmt.Errorf("when kind is %s, FakeSpec must be set", gen.Spec.Kind)
  146. }
  147. return &genv1alpha1.Fake{
  148. TypeMeta: metav1.TypeMeta{
  149. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  150. Kind: genv1alpha1.FakeKind,
  151. },
  152. Spec: *gen.Spec.Generator.FakeSpec,
  153. }, nil
  154. case genv1alpha1.GeneratorKindGCRAccessToken:
  155. if gen.Spec.Generator.GCRAccessTokenSpec == nil {
  156. return nil, fmt.Errorf("when kind is %s, GCRAccessTokenSpec must be set", gen.Spec.Kind)
  157. }
  158. return &genv1alpha1.GCRAccessToken{
  159. TypeMeta: metav1.TypeMeta{
  160. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  161. Kind: genv1alpha1.GCRAccessTokenKind,
  162. },
  163. Spec: *gen.Spec.Generator.GCRAccessTokenSpec,
  164. }, nil
  165. case genv1alpha1.GeneratorKindGithubAccessToken:
  166. if gen.Spec.Generator.GithubAccessTokenSpec == nil {
  167. return nil, fmt.Errorf("when kind is %s, GithubAccessTokenSpec must be set", gen.Spec.Kind)
  168. }
  169. return &genv1alpha1.GithubAccessToken{
  170. TypeMeta: metav1.TypeMeta{
  171. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  172. Kind: genv1alpha1.GithubAccessTokenKind,
  173. },
  174. Spec: *gen.Spec.Generator.GithubAccessTokenSpec,
  175. }, nil
  176. case genv1alpha1.GeneratorKindQuayAccessToken:
  177. if gen.Spec.Generator.QuayAccessTokenSpec == nil {
  178. return nil, fmt.Errorf("when kind is %s, QuayAccessTokenSpec must be set", gen.Spec.Kind)
  179. }
  180. return &genv1alpha1.QuayAccessToken{
  181. Spec: *gen.Spec.Generator.QuayAccessTokenSpec,
  182. }, nil
  183. case genv1alpha1.GeneratorKindPassword:
  184. if gen.Spec.Generator.PasswordSpec == nil {
  185. return nil, fmt.Errorf("when kind is %s, PasswordSpec must be set", gen.Spec.Kind)
  186. }
  187. return &genv1alpha1.Password{
  188. TypeMeta: metav1.TypeMeta{
  189. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  190. Kind: genv1alpha1.PasswordKind,
  191. },
  192. Spec: *gen.Spec.Generator.PasswordSpec,
  193. }, nil
  194. case genv1alpha1.GeneratorKindSSHKey:
  195. if gen.Spec.Generator.SSHKeySpec == nil {
  196. return nil, fmt.Errorf("when kind is %s, SSHKeySpec must be set", gen.Spec.Kind)
  197. }
  198. return &genv1alpha1.SSHKey{
  199. TypeMeta: metav1.TypeMeta{
  200. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  201. Kind: genv1alpha1.SSHKeyKind,
  202. },
  203. Spec: *gen.Spec.Generator.SSHKeySpec,
  204. }, nil
  205. case genv1alpha1.GeneratorKindSTSSessionToken:
  206. if gen.Spec.Generator.STSSessionTokenSpec == nil {
  207. return nil, fmt.Errorf("when kind is %s, STSSessionTokenSpec must be set", gen.Spec.Kind)
  208. }
  209. return &genv1alpha1.STSSessionToken{
  210. TypeMeta: metav1.TypeMeta{
  211. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  212. Kind: genv1alpha1.STSSessionTokenKind,
  213. },
  214. Spec: *gen.Spec.Generator.STSSessionTokenSpec,
  215. }, nil
  216. case genv1alpha1.GeneratorKindUUID:
  217. if gen.Spec.Generator.UUIDSpec == nil {
  218. return nil, fmt.Errorf("when kind is %s, UUIDSpec must be set", gen.Spec.Kind)
  219. }
  220. return &genv1alpha1.UUID{
  221. TypeMeta: metav1.TypeMeta{
  222. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  223. Kind: genv1alpha1.UUIDKind,
  224. },
  225. Spec: *gen.Spec.Generator.UUIDSpec,
  226. }, nil
  227. case genv1alpha1.GeneratorKindVaultDynamicSecret:
  228. if gen.Spec.Generator.VaultDynamicSecretSpec == nil {
  229. return nil, fmt.Errorf("when kind is %s, VaultDynamicSecretSpec must be set", gen.Spec.Kind)
  230. }
  231. return &genv1alpha1.VaultDynamicSecret{
  232. TypeMeta: metav1.TypeMeta{
  233. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  234. Kind: genv1alpha1.VaultDynamicSecretKind,
  235. },
  236. Spec: *gen.Spec.Generator.VaultDynamicSecretSpec,
  237. }, nil
  238. case genv1alpha1.GeneratorKindWebhook:
  239. if gen.Spec.Generator.WebhookSpec == nil {
  240. return nil, fmt.Errorf("when kind is %s, WebhookSpec must be set", gen.Spec.Kind)
  241. }
  242. return &genv1alpha1.Webhook{
  243. TypeMeta: metav1.TypeMeta{
  244. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  245. Kind: genv1alpha1.WebhookKind,
  246. },
  247. Spec: *gen.Spec.Generator.WebhookSpec,
  248. }, nil
  249. case genv1alpha1.GeneratorKindGrafana:
  250. if gen.Spec.Generator.GrafanaSpec == nil {
  251. return nil, fmt.Errorf("when kind is %s, GrafanaSpec must be set", gen.Spec.Kind)
  252. }
  253. return &genv1alpha1.Grafana{
  254. TypeMeta: metav1.TypeMeta{
  255. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  256. Kind: genv1alpha1.GrafanaKind,
  257. },
  258. Spec: *gen.Spec.Generator.GrafanaSpec,
  259. }, nil
  260. case genv1alpha1.GeneratorKindMFA:
  261. if gen.Spec.Generator.MFASpec == nil {
  262. return nil, fmt.Errorf("when kind is %s, MFASpec must be set", gen.Spec.Kind)
  263. }
  264. return &genv1alpha1.MFA{
  265. TypeMeta: metav1.TypeMeta{
  266. APIVersion: genv1alpha1.SchemeGroupVersion.String(),
  267. Kind: genv1alpha1.MFAKind,
  268. },
  269. Spec: *gen.Spec.Generator.MFASpec,
  270. }, nil
  271. default:
  272. return nil, fmt.Errorf("unknown kind %s", gen.Spec.Kind)
  273. }
  274. }