pushsecret_controller.go 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270
  1. /*
  2. Copyright © The ESO Authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. // Package pushsecret implements the controller for managing PushSecret resources.
  14. package pushsecret
  15. import (
  16. "bytes"
  17. "context"
  18. "errors"
  19. "fmt"
  20. "maps"
  21. "regexp"
  22. "slices"
  23. "strings"
  24. "text/template"
  25. "time"
  26. "github.com/go-logr/logr"
  27. v1 "k8s.io/api/core/v1"
  28. apierrors "k8s.io/apimachinery/pkg/api/errors"
  29. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  30. "k8s.io/apimachinery/pkg/labels"
  31. "k8s.io/apimachinery/pkg/runtime"
  32. "k8s.io/apimachinery/pkg/types"
  33. "k8s.io/client-go/rest"
  34. "k8s.io/client-go/tools/record"
  35. ctrl "sigs.k8s.io/controller-runtime"
  36. "sigs.k8s.io/controller-runtime/pkg/client"
  37. "sigs.k8s.io/controller-runtime/pkg/controller"
  38. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  39. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  40. esapi "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  41. genv1alpha1 "github.com/external-secrets/external-secrets/apis/generators/v1alpha1"
  42. ctrlmetrics "github.com/external-secrets/external-secrets/pkg/controllers/metrics"
  43. "github.com/external-secrets/external-secrets/pkg/controllers/pushsecret/psmetrics"
  44. "github.com/external-secrets/external-secrets/pkg/controllers/secretstore"
  45. ctrlutil "github.com/external-secrets/external-secrets/pkg/controllers/util"
  46. "github.com/external-secrets/external-secrets/runtime/esutils"
  47. "github.com/external-secrets/external-secrets/runtime/esutils/resolvers"
  48. "github.com/external-secrets/external-secrets/runtime/statemanager"
  49. estemplate "github.com/external-secrets/external-secrets/runtime/template/v2"
  50. "github.com/external-secrets/external-secrets/runtime/util/locks"
  51. // Load registered generators.
  52. _ "github.com/external-secrets/external-secrets/pkg/register"
  53. )
  54. const (
  55. errFailedGetSecret = "could not get source secret"
  56. errPatchStatus = "error merging"
  57. errGetSecretStore = "could not get SecretStore %q, %w"
  58. errGetClusterSecretStore = "could not get ClusterSecretStore %q, %w"
  59. errSetSecretFailed = "could not write remote ref %v to target secretstore %v: %v"
  60. errFailedSetSecret = "set secret failed: %v"
  61. errConvert = "could not apply conversion strategy to keys: %v"
  62. pushSecretFinalizer = "pushsecret.externalsecrets.io/finalizer"
  63. errCloudNotUpdateFinalizer = "could not update finalizers: %w"
  64. bundleSourceKey = "(bundle)"
  65. )
  66. // Reconciler is the controller for PushSecret resources.
  67. // It manages the lifecycle of PushSecrets, ensuring that secrets are pushed to
  68. // specified secret stores according to the defined policies and templates.
  69. type Reconciler struct {
  70. client.Client
  71. Log logr.Logger
  72. Scheme *runtime.Scheme
  73. recorder record.EventRecorder
  74. RestConfig *rest.Config
  75. RequeueInterval time.Duration
  76. ControllerClass string
  77. }
  78. // storeInfo holds the identifying attributes of a secret store for per-store processing.
  79. type storeInfo struct {
  80. Name string
  81. Kind string
  82. Labels map[string]string
  83. }
  84. // SetupWithManager sets up the controller with the Manager.
  85. // It configures the controller to watch PushSecret resources and
  86. // manages indexing for efficient lookups based on secret stores and deletion policies.
  87. func (r *Reconciler) SetupWithManager(ctx context.Context, mgr ctrl.Manager, opts controller.Options) error {
  88. r.recorder = mgr.GetEventRecorderFor("pushsecret")
  89. // Index PushSecrets by the stores they have pushed to (for finalizer management on store deletion)
  90. // Refer to common.go for more details on the index function
  91. if err := mgr.GetFieldIndexer().IndexField(ctx, &esapi.PushSecret{}, "status.syncedPushSecrets", func(obj client.Object) []string {
  92. ps := obj.(*esapi.PushSecret)
  93. // Only index PushSecrets with DeletionPolicy=Delete for efficiency
  94. if ps.Spec.DeletionPolicy != esapi.PushSecretDeletionPolicyDelete {
  95. return nil
  96. }
  97. // Format is typically "Kind/Name" (e.g., "SecretStore/store1", "ClusterSecretStore/clusterstore1")
  98. storeKeys := make([]string, 0, len(ps.Status.SyncedPushSecrets))
  99. for storeKey := range ps.Status.SyncedPushSecrets {
  100. storeKeys = append(storeKeys, storeKey)
  101. }
  102. return storeKeys
  103. }); err != nil {
  104. return err
  105. }
  106. // Index PushSecrets by deletionPolicy for quick filtering
  107. if err := mgr.GetFieldIndexer().IndexField(ctx, &esapi.PushSecret{}, "spec.deletionPolicy", func(obj client.Object) []string {
  108. ps := obj.(*esapi.PushSecret)
  109. return []string{string(ps.Spec.DeletionPolicy)}
  110. }); err != nil {
  111. return err
  112. }
  113. return ctrl.NewControllerManagedBy(mgr).
  114. WithOptions(opts).
  115. For(&esapi.PushSecret{}).
  116. Complete(r)
  117. }
  118. // Reconcile is part of the main kubernetes reconciliation loop which aims to
  119. // move the current state of the cluster closer to the desired state.
  120. // For more details, check Reconcile and its Result here:
  121. // - https://pkg.go.dev/sigs.k8s.io/controller-runtime/pkg/reconcile
  122. func (r *Reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
  123. log := r.Log.WithValues("pushsecret", req.NamespacedName)
  124. resourceLabels := ctrlmetrics.RefineNonConditionMetricLabels(map[string]string{"name": req.Name, "namespace": req.Namespace})
  125. start := time.Now()
  126. pushSecretReconcileDuration := psmetrics.GetGaugeVec(psmetrics.PushSecretReconcileDurationKey)
  127. defer func() { pushSecretReconcileDuration.With(resourceLabels).Set(float64(time.Since(start))) }()
  128. var ps esapi.PushSecret
  129. mgr := secretstore.NewManager(r.Client, r.ControllerClass, false)
  130. defer func() {
  131. _ = mgr.Close(ctx)
  132. }()
  133. if err := r.Get(ctx, req.NamespacedName, &ps); err != nil {
  134. if apierrors.IsNotFound(err) {
  135. return ctrl.Result{}, nil
  136. }
  137. msg := "unable to get PushSecret"
  138. r.recorder.Event(&ps, v1.EventTypeWarning, esapi.ReasonErrored, msg)
  139. log.Error(err, msg)
  140. return ctrl.Result{}, fmt.Errorf("get resource: %w", err)
  141. }
  142. refreshInt := r.RequeueInterval
  143. if ps.Spec.RefreshInterval != nil {
  144. refreshInt = ps.Spec.RefreshInterval.Duration
  145. }
  146. p := client.MergeFrom(ps.DeepCopy())
  147. defer func() {
  148. err := r.Client.Status().Patch(ctx, &ps, p)
  149. if err != nil && !apierrors.IsNotFound(err) {
  150. log.Error(err, errPatchStatus)
  151. }
  152. }()
  153. switch ps.Spec.DeletionPolicy {
  154. case esapi.PushSecretDeletionPolicyDelete:
  155. // finalizer logic. Only added if we should delete the secrets
  156. if ps.ObjectMeta.DeletionTimestamp.IsZero() {
  157. if added := controllerutil.AddFinalizer(&ps, pushSecretFinalizer); added {
  158. if err := r.Client.Update(ctx, &ps, &client.UpdateOptions{}); err != nil {
  159. return ctrl.Result{}, fmt.Errorf(errCloudNotUpdateFinalizer, err)
  160. }
  161. return ctrl.Result{Requeue: true}, nil
  162. }
  163. } else if controllerutil.ContainsFinalizer(&ps, pushSecretFinalizer) {
  164. // trigger a cleanup with no Synced Map
  165. badState, err := r.DeleteSecretFromProviders(ctx, &ps, esapi.SyncedPushSecretsMap{}, mgr)
  166. if err != nil {
  167. msg := fmt.Sprintf("Failed to Delete Secrets from Provider: %v", err)
  168. r.markAsFailed(msg, &ps, badState)
  169. return ctrl.Result{}, err
  170. }
  171. controllerutil.RemoveFinalizer(&ps, pushSecretFinalizer)
  172. if err := r.Client.Update(ctx, &ps, &client.UpdateOptions{}); err != nil {
  173. return ctrl.Result{}, fmt.Errorf("could not update finalizers: %w", err)
  174. }
  175. return ctrl.Result{}, nil
  176. }
  177. case esapi.PushSecretDeletionPolicyNone:
  178. if controllerutil.ContainsFinalizer(&ps, pushSecretFinalizer) {
  179. controllerutil.RemoveFinalizer(&ps, pushSecretFinalizer)
  180. if err := r.Client.Update(ctx, &ps, &client.UpdateOptions{}); err != nil {
  181. return ctrl.Result{}, fmt.Errorf(errCloudNotUpdateFinalizer, err)
  182. }
  183. }
  184. default:
  185. }
  186. timeSinceLastRefresh := 0 * time.Second
  187. if !ps.Status.RefreshTime.IsZero() {
  188. timeSinceLastRefresh = time.Since(ps.Status.RefreshTime.Time)
  189. }
  190. if !shouldRefresh(ps) {
  191. refreshInt = (ps.Spec.RefreshInterval.Duration - timeSinceLastRefresh) + 5*time.Second
  192. log.V(1).Info("skipping refresh", "rv", ctrlutil.GetResourceVersion(ps.ObjectMeta), "nr", refreshInt.Seconds())
  193. return ctrl.Result{RequeueAfter: refreshInt}, nil
  194. }
  195. if err := validateDataToStoreRefs(ps.Spec.DataTo, ps.Spec.SecretStoreRefs); err != nil {
  196. r.markAsFailed(err.Error(), &ps, nil)
  197. return ctrl.Result{}, err
  198. }
  199. secrets, err := r.resolveSecrets(ctx, &ps)
  200. if err != nil {
  201. isSecretSelector := ps.Spec.Selector.Secret != nil && ps.Spec.Selector.Secret.Name != ""
  202. if apierrors.IsNotFound(err) && isSecretSelector &&
  203. ps.Spec.DeletionPolicy == esapi.PushSecretDeletionPolicyDelete &&
  204. len(ps.Status.SyncedPushSecrets) > 0 {
  205. return ctrl.Result{}, r.handleSourceSecretDeleted(ctx, &ps, mgr)
  206. }
  207. r.markAsFailed(errFailedGetSecret, &ps, nil)
  208. return ctrl.Result{}, err
  209. }
  210. secretStores, err := r.GetSecretStores(ctx, ps)
  211. if err != nil {
  212. r.markAsFailed(err.Error(), &ps, nil)
  213. return ctrl.Result{}, err
  214. }
  215. // Filter out SecretStores that are being deleted to avoid finalizer conflicts
  216. activeSecretStores := make(map[esapi.PushSecretStoreRef]esv1.GenericStore, len(secretStores))
  217. for ref, store := range secretStores {
  218. // Skip stores that are being deleted
  219. if !store.GetDeletionTimestamp().IsZero() {
  220. log.Info("skipping SecretStore that is being deleted", "storeName", store.GetName(), "storeKind", store.GetKind())
  221. continue
  222. }
  223. activeSecretStores[ref] = store
  224. }
  225. secretStores, err = removeUnmanagedStores(ctx, req.Namespace, r, activeSecretStores)
  226. if err != nil {
  227. r.markAsFailed(err.Error(), &ps, nil)
  228. return ctrl.Result{}, err
  229. }
  230. // if no stores are managed by this controller
  231. if len(secretStores) == 0 {
  232. return ctrl.Result{}, nil
  233. }
  234. if err := validateDataToMatchesResolvedStores(ps.Spec.DataTo, secretStores); err != nil {
  235. r.markAsFailed(err.Error(), &ps, nil)
  236. return ctrl.Result{}, err
  237. }
  238. allSyncedSecrets := make(esapi.SyncedPushSecretsMap)
  239. for _, secret := range secrets {
  240. if err := r.applyTemplate(ctx, &ps, &secret); err != nil {
  241. return ctrl.Result{}, err
  242. }
  243. syncedSecrets, err := r.PushSecretToProviders(ctx, secretStores, ps, &secret, mgr)
  244. if err != nil {
  245. if errors.Is(err, locks.ErrConflict) {
  246. log.Info("retry to acquire lock to update the secret later", "error", err)
  247. return ctrl.Result{Requeue: true}, nil
  248. }
  249. totalSecrets := mergeSecretState(syncedSecrets, ps.Status.SyncedPushSecrets)
  250. msg := fmt.Sprintf(errFailedSetSecret, err)
  251. r.markAsFailed(msg, &ps, totalSecrets)
  252. return ctrl.Result{}, err
  253. }
  254. switch ps.Spec.DeletionPolicy {
  255. case esapi.PushSecretDeletionPolicyDelete:
  256. badSyncState, err := r.DeleteSecretFromProviders(ctx, &ps, syncedSecrets, mgr)
  257. if err != nil {
  258. msg := fmt.Sprintf("Failed to Delete Secrets from Provider: %v", err)
  259. r.markAsFailed(msg, &ps, badSyncState)
  260. return ctrl.Result{}, err
  261. }
  262. case esapi.PushSecretDeletionPolicyNone:
  263. default:
  264. }
  265. allSyncedSecrets = mergeSecretState(allSyncedSecrets, syncedSecrets)
  266. }
  267. r.markAsDone(&ps, allSyncedSecrets, start)
  268. return ctrl.Result{RequeueAfter: refreshInt}, nil
  269. }
  270. // handleSourceSecretDeleted cleans up provider secrets when source Secret is unavailable.
  271. func (r *Reconciler) handleSourceSecretDeleted(ctx context.Context, ps *esapi.PushSecret, mgr *secretstore.Manager) error {
  272. log := r.Log.WithValues("pushsecret", client.ObjectKeyFromObject(ps))
  273. log.Info("source secret unavailable, cleaning up provider secrets", "syncedSecrets", len(ps.Status.SyncedPushSecrets))
  274. badState, err := r.DeleteSecretFromProviders(ctx, ps, esapi.SyncedPushSecretsMap{}, mgr)
  275. if err != nil {
  276. msg := fmt.Sprintf("failed to cleanup provider secrets: %v", err)
  277. r.markAsFailed(msg, ps, badState)
  278. return err
  279. }
  280. r.setSecrets(ps, esapi.SyncedPushSecretsMap{})
  281. r.markAsSourceDeleted(ps)
  282. return nil
  283. }
  284. func shouldRefresh(ps esapi.PushSecret) bool {
  285. if ps.Status.SyncedResourceVersion != ctrlutil.GetResourceVersion(ps.ObjectMeta) {
  286. return true
  287. }
  288. if ps.Spec.RefreshInterval.Duration == 0 && ps.Status.SyncedResourceVersion != "" {
  289. return false
  290. }
  291. if ps.Status.RefreshTime.IsZero() {
  292. return true
  293. }
  294. return ps.Status.RefreshTime.Add(ps.Spec.RefreshInterval.Duration).Before(time.Now())
  295. }
  296. func (r *Reconciler) markAsFailed(msg string, ps *esapi.PushSecret, syncState esapi.SyncedPushSecretsMap) {
  297. cond := NewPushSecretCondition(esapi.PushSecretReady, v1.ConditionFalse, esapi.ReasonErrored, msg)
  298. SetPushSecretCondition(ps, *cond)
  299. if syncState != nil {
  300. r.setSecrets(ps, syncState)
  301. }
  302. r.recorder.Event(ps, v1.EventTypeWarning, esapi.ReasonErrored, msg)
  303. }
  304. func (r *Reconciler) markAsSourceDeleted(ps *esapi.PushSecret) {
  305. msg := "source secret deleted; provider secrets cleaned up"
  306. cond := NewPushSecretCondition(esapi.PushSecretReady, v1.ConditionFalse, esapi.ReasonSourceDeleted, msg)
  307. SetPushSecretCondition(ps, *cond)
  308. r.recorder.Event(ps, v1.EventTypeNormal, esapi.ReasonSourceDeleted, msg)
  309. }
  310. func (r *Reconciler) markAsDone(ps *esapi.PushSecret, secrets esapi.SyncedPushSecretsMap, start time.Time) {
  311. msg := "PushSecret synced successfully"
  312. if ps.Spec.UpdatePolicy == esapi.PushSecretUpdatePolicyIfNotExists {
  313. msg += ". Existing secrets in providers unchanged."
  314. }
  315. cond := NewPushSecretCondition(esapi.PushSecretReady, v1.ConditionTrue, esapi.ReasonSynced, msg)
  316. SetPushSecretCondition(ps, *cond)
  317. r.setSecrets(ps, secrets)
  318. ps.Status.RefreshTime = metav1.NewTime(start)
  319. ps.Status.SyncedResourceVersion = ctrlutil.GetResourceVersion(ps.ObjectMeta)
  320. r.recorder.Event(ps, v1.EventTypeNormal, esapi.ReasonSynced, msg)
  321. }
  322. func (r *Reconciler) setSecrets(ps *esapi.PushSecret, status esapi.SyncedPushSecretsMap) {
  323. ps.Status.SyncedPushSecrets = status
  324. }
  325. func mergeSecretState(newMap, old esapi.SyncedPushSecretsMap) esapi.SyncedPushSecretsMap {
  326. if newMap == nil {
  327. return old
  328. }
  329. out := newMap.DeepCopy()
  330. for k, v := range old {
  331. _, ok := out[k]
  332. if !ok {
  333. out[k] = make(map[string]esapi.PushSecretData)
  334. }
  335. maps.Insert(out[k], maps.All(v))
  336. }
  337. return out
  338. }
  339. // DeleteSecretFromProviders removes secrets from providers that are no longer needed.
  340. // It compares the existing synced secrets in the PushSecret status with the new desired state,
  341. // and deletes any secrets that are no longer present in the new state.
  342. func (r *Reconciler) DeleteSecretFromProviders(ctx context.Context, ps *esapi.PushSecret, newMap esapi.SyncedPushSecretsMap, mgr *secretstore.Manager) (esapi.SyncedPushSecretsMap, error) {
  343. out := mergeSecretState(newMap, ps.Status.SyncedPushSecrets)
  344. for storeName, oldData := range ps.Status.SyncedPushSecrets {
  345. storeRef := esv1.SecretStoreRef{
  346. Name: strings.Split(storeName, "/")[1],
  347. Kind: strings.Split(storeName, "/")[0],
  348. }
  349. client, err := mgr.Get(ctx, storeRef, ps.Namespace, nil)
  350. if err != nil {
  351. return out, fmt.Errorf("could not get secrets client for store %v: %w", storeName, err)
  352. }
  353. newData, ok := newMap[storeName]
  354. if !ok {
  355. err = r.DeleteAllSecretsFromStore(ctx, client, oldData)
  356. if err != nil {
  357. return out, err
  358. }
  359. delete(out, storeName)
  360. continue
  361. }
  362. for oldEntry, oldRef := range oldData {
  363. _, ok := newData[oldEntry]
  364. if !ok {
  365. err = r.DeleteSecretFromStore(ctx, client, oldRef)
  366. if err != nil {
  367. return out, err
  368. }
  369. delete(out[storeName], oldEntry)
  370. }
  371. }
  372. }
  373. return out, nil
  374. }
  375. // DeleteAllSecretsFromStore removes all secrets from a given secret store.
  376. func (r *Reconciler) DeleteAllSecretsFromStore(ctx context.Context, client esv1.SecretsClient, data map[string]esapi.PushSecretData) error {
  377. for _, v := range data {
  378. err := r.DeleteSecretFromStore(ctx, client, v)
  379. if err != nil {
  380. return err
  381. }
  382. }
  383. return nil
  384. }
  385. // DeleteSecretFromStore removes a specific secret from a given secret store.
  386. func (r *Reconciler) DeleteSecretFromStore(ctx context.Context, client esv1.SecretsClient, data esapi.PushSecretData) error {
  387. return client.DeleteSecret(ctx, data.Match.RemoteRef)
  388. }
  389. // PushSecretToProviders pushes the secret data to the specified secret stores.
  390. // It iterates over each store and handles the push operation according to the
  391. // defined update policies and conversion strategies.
  392. func (r *Reconciler) PushSecretToProviders(
  393. ctx context.Context,
  394. stores map[esapi.PushSecretStoreRef]esv1.GenericStore,
  395. ps esapi.PushSecret,
  396. secret *v1.Secret,
  397. mgr *secretstore.Manager,
  398. ) (esapi.SyncedPushSecretsMap, error) {
  399. out := make(esapi.SyncedPushSecretsMap)
  400. var err error
  401. for ref, store := range stores {
  402. si := storeInfo{Name: store.GetName(), Kind: ref.Kind, Labels: store.GetLabels()}
  403. out, err = r.handlePushSecretDataForStore(ctx, ps, secret, out, mgr, si)
  404. if err != nil {
  405. return out, err
  406. }
  407. }
  408. return out, nil
  409. }
  410. func (r *Reconciler) handlePushSecretDataForStore(
  411. ctx context.Context,
  412. ps esapi.PushSecret,
  413. secret *v1.Secret,
  414. out esapi.SyncedPushSecretsMap,
  415. mgr *secretstore.Manager,
  416. si storeInfo,
  417. ) (esapi.SyncedPushSecretsMap, error) {
  418. storeKey := fmt.Sprintf("%v/%v", si.Kind, si.Name)
  419. out[storeKey] = make(map[string]esapi.PushSecretData)
  420. storeRef := esv1.SecretStoreRef{
  421. Name: si.Name,
  422. Kind: si.Kind,
  423. }
  424. secretClient, err := mgr.Get(ctx, storeRef, ps.GetNamespace(), nil)
  425. if err != nil {
  426. return out, fmt.Errorf("could not get secrets client for store %v: %w", si.Name, err)
  427. }
  428. storeSecret := secret.DeepCopy()
  429. filteredDataTo, err := filterDataToForStore(ps.Spec.DataTo, si.Name, si.Kind, si.Labels)
  430. if err != nil {
  431. return out, fmt.Errorf("failed to filter dataTo: %w", err)
  432. }
  433. dataToEntries, bundleOverrides, err := r.expandDataTo(storeSecret, filteredDataTo)
  434. if err != nil {
  435. return out, fmt.Errorf("failed to expand dataTo: %w", err)
  436. }
  437. allData, err := mergeDataEntries(dataToEntries, ps.Spec.Data, storeSecret)
  438. if err != nil {
  439. return out, fmt.Errorf("failed to merge data entries: %w", err)
  440. }
  441. originalStoreSecretData := storeSecret.Data
  442. for _, data := range allData {
  443. params := pushEntryParams{
  444. data: data,
  445. updatePolicy: ps.Spec.UpdatePolicy,
  446. originalData: originalStoreSecretData,
  447. dataOverride: bundleOverrides[statusRef(data)],
  448. storeName: si.Name,
  449. }
  450. if err := r.pushSecretEntry(ctx, secretClient, storeSecret, params); err != nil {
  451. return out, err
  452. }
  453. out[storeKey][statusRef(data)] = data
  454. }
  455. return out, nil
  456. }
  457. // pushEntryParams groups the parameters for pushSecretEntry to keep the
  458. // function signature within the recommended parameter count.
  459. type pushEntryParams struct {
  460. data esapi.PushSecretData
  461. updatePolicy esapi.PushSecretUpdatePolicy
  462. originalData map[string][]byte
  463. dataOverride map[string][]byte
  464. storeName string
  465. }
  466. // pushSecretEntry converts, validates, and pushes a single data entry to the provider.
  467. // If the update policy is IfNotExists and the secret already exists, the push is skipped.
  468. // params.dataOverride, when non-nil, replaces params.originalData for the conversion step —
  469. // used by bundle entries (dataTo with remoteKey) to restrict the pushed payload to matched keys only.
  470. func (r *Reconciler) pushSecretEntry(
  471. ctx context.Context,
  472. secretClient esv1.SecretsClient,
  473. storeSecret *v1.Secret,
  474. params pushEntryParams,
  475. ) error {
  476. sourceData := params.originalData
  477. if params.dataOverride != nil {
  478. sourceData = params.dataOverride
  479. }
  480. secretData, err := esutils.ReverseKeys(params.data.ConversionStrategy, sourceData)
  481. if err != nil {
  482. return fmt.Errorf(errConvert, err)
  483. }
  484. key := params.data.GetSecretKey()
  485. if !secretKeyExists(key, secretData) {
  486. return fmt.Errorf("secret key %v does not exist", key)
  487. }
  488. if params.updatePolicy == esapi.PushSecretUpdatePolicyIfNotExists {
  489. exists, err := secretClient.SecretExists(ctx, params.data.Match.RemoteRef)
  490. if err != nil {
  491. return fmt.Errorf("could not verify if secret exists in store: %w", err)
  492. }
  493. if exists {
  494. return nil
  495. }
  496. }
  497. localSecret := storeSecret.DeepCopy()
  498. localSecret.Data = secretData
  499. if err := secretClient.PushSecret(ctx, localSecret, params.data); err != nil {
  500. return fmt.Errorf(errSetSecretFailed, key, params.storeName, err)
  501. }
  502. return nil
  503. }
  504. func secretKeyExists(key string, data map[string][]byte) bool {
  505. _, ok := data[key]
  506. return key == "" || ok
  507. }
  508. const defaultGeneratorStateKey = "__pushsecret"
  509. func (r *Reconciler) resolveSecrets(ctx context.Context, ps *esapi.PushSecret) ([]v1.Secret, error) {
  510. var err error
  511. generatorState := statemanager.New(ctx, r.Client, r.Scheme, ps.Namespace, ps)
  512. defer func() {
  513. if err != nil {
  514. if err := generatorState.Rollback(); err != nil {
  515. r.Log.Error(err, "error rolling back generator state")
  516. }
  517. return
  518. }
  519. if err := generatorState.Commit(); err != nil {
  520. r.Log.Error(err, "error committing generator state")
  521. }
  522. }()
  523. switch {
  524. case ps.Spec.Selector.Secret != nil && ps.Spec.Selector.Secret.Name != "":
  525. secretName := types.NamespacedName{Name: ps.Spec.Selector.Secret.Name, Namespace: ps.Namespace}
  526. secret := &v1.Secret{}
  527. if err := r.Client.Get(ctx, secretName, secret); err != nil {
  528. return nil, err
  529. }
  530. generatorState.EnqueueFlagLatestStateForGC(defaultGeneratorStateKey)
  531. return []v1.Secret{*secret}, nil
  532. case ps.Spec.Selector.GeneratorRef != nil:
  533. secret, err := r.resolveSecretFromGenerator(ctx, ps.Namespace, ps.Spec.Selector.GeneratorRef, generatorState)
  534. if err != nil {
  535. return nil, fmt.Errorf("could not resolve secret from generator ref %v: %w", ps.Spec.Selector.GeneratorRef, err)
  536. }
  537. return []v1.Secret{*secret}, nil
  538. case ps.Spec.Selector.Secret != nil && ps.Spec.Selector.Secret.Selector != nil:
  539. labelSelector, err := metav1.LabelSelectorAsSelector(ps.Spec.Selector.Secret.Selector)
  540. if err != nil {
  541. return nil, err
  542. }
  543. var secretList v1.SecretList
  544. err = r.List(ctx, &secretList, &client.ListOptions{LabelSelector: labelSelector, Namespace: ps.Namespace})
  545. if err != nil {
  546. return nil, err
  547. }
  548. return secretList.Items, err
  549. }
  550. return nil, errors.New("no secret selector provided")
  551. }
  552. func (r *Reconciler) resolveSecretFromGenerator(ctx context.Context, namespace string, generatorRef *esv1.GeneratorRef, generatorState *statemanager.Manager) (*v1.Secret, error) {
  553. gen, genResource, err := resolvers.GeneratorRef(ctx, r.Client, r.Scheme, namespace, generatorRef)
  554. if err != nil {
  555. return nil, fmt.Errorf("unable to resolve generator: %w", err)
  556. }
  557. var prevState *genv1alpha1.GeneratorState
  558. if generatorState != nil {
  559. prevState, err = generatorState.GetLatestState(defaultGeneratorStateKey)
  560. if err != nil {
  561. return nil, fmt.Errorf("unable to get latest state: %w", err)
  562. }
  563. }
  564. secretMap, newState, err := gen.Generate(ctx, genResource, r.Client, namespace)
  565. if err != nil {
  566. return nil, fmt.Errorf("unable to generate: %w", err)
  567. }
  568. if prevState != nil && generatorState != nil {
  569. generatorState.EnqueueMoveStateToGC(defaultGeneratorStateKey)
  570. }
  571. if generatorState != nil {
  572. generatorState.EnqueueSetLatest(ctx, defaultGeneratorStateKey, namespace, genResource, gen, newState)
  573. }
  574. return &v1.Secret{
  575. ObjectMeta: metav1.ObjectMeta{
  576. Name: "___generated-secret",
  577. Namespace: namespace,
  578. },
  579. Data: secretMap,
  580. }, err
  581. }
  582. // GetSecretStores retrieves the SecretStore and ClusterSecretStore resources
  583. // referenced in the PushSecret. It supports both direct references by name
  584. // and label selectors to find multiple stores.
  585. func (r *Reconciler) GetSecretStores(ctx context.Context, ps esapi.PushSecret) (map[esapi.PushSecretStoreRef]esv1.GenericStore, error) {
  586. stores := make(map[esapi.PushSecretStoreRef]esv1.GenericStore)
  587. for _, refStore := range ps.Spec.SecretStoreRefs {
  588. if refStore.LabelSelector != nil {
  589. labelSelector, err := metav1.LabelSelectorAsSelector(refStore.LabelSelector)
  590. if err != nil {
  591. return nil, fmt.Errorf("could not convert labels: %w", err)
  592. }
  593. if refStore.Kind == esv1.ClusterSecretStoreKind {
  594. clusterSecretStoreList := esv1.ClusterSecretStoreList{}
  595. err = r.List(ctx, &clusterSecretStoreList, &client.ListOptions{LabelSelector: labelSelector})
  596. if err != nil {
  597. return nil, fmt.Errorf("could not list cluster Secret Stores: %w", err)
  598. }
  599. for k, v := range clusterSecretStoreList.Items {
  600. key := esapi.PushSecretStoreRef{
  601. Name: v.Name,
  602. Kind: esv1.ClusterSecretStoreKind,
  603. }
  604. stores[key] = &clusterSecretStoreList.Items[k]
  605. }
  606. } else {
  607. secretStoreList := esv1.SecretStoreList{}
  608. err = r.List(ctx, &secretStoreList, &client.ListOptions{LabelSelector: labelSelector, Namespace: ps.Namespace})
  609. if err != nil {
  610. return nil, fmt.Errorf("could not list Secret Stores: %w", err)
  611. }
  612. for k, v := range secretStoreList.Items {
  613. key := esapi.PushSecretStoreRef{
  614. Name: v.Name,
  615. Kind: esv1.SecretStoreKind,
  616. }
  617. stores[key] = &secretStoreList.Items[k]
  618. }
  619. }
  620. } else {
  621. store, err := r.getSecretStoreFromName(ctx, refStore, ps.Namespace)
  622. if err != nil {
  623. return nil, err
  624. }
  625. stores[refStore] = store
  626. }
  627. }
  628. return stores, nil
  629. }
  630. func (r *Reconciler) getSecretStoreFromName(ctx context.Context, refStore esapi.PushSecretStoreRef, ns string) (esv1.GenericStore, error) {
  631. if refStore.Name == "" {
  632. return nil, errors.New("refStore Name must be provided")
  633. }
  634. ref := types.NamespacedName{
  635. Name: refStore.Name,
  636. }
  637. if refStore.Kind == esv1.ClusterSecretStoreKind {
  638. var store esv1.ClusterSecretStore
  639. err := r.Get(ctx, ref, &store)
  640. if err != nil {
  641. return nil, fmt.Errorf(errGetClusterSecretStore, ref.Name, err)
  642. }
  643. return &store, nil
  644. }
  645. ref.Namespace = ns
  646. var store esv1.SecretStore
  647. err := r.Get(ctx, ref, &store)
  648. if err != nil {
  649. return nil, fmt.Errorf(errGetSecretStore, ref.Name, err)
  650. }
  651. return &store, nil
  652. }
  653. // NewPushSecretCondition creates a new PushSecret condition.
  654. func NewPushSecretCondition(condType esapi.PushSecretConditionType, status v1.ConditionStatus, reason, message string) *esapi.PushSecretStatusCondition {
  655. return &esapi.PushSecretStatusCondition{
  656. Type: condType,
  657. Status: status,
  658. LastTransitionTime: metav1.Now(),
  659. Reason: reason,
  660. Message: message,
  661. }
  662. }
  663. // SetPushSecretCondition updates the PushSecret to include the provided condition.
  664. func SetPushSecretCondition(ps *esapi.PushSecret, condition esapi.PushSecretStatusCondition) {
  665. currentCond := GetPushSecretCondition(ps.Status.Conditions, condition.Type)
  666. if currentCond != nil && currentCond.Status == condition.Status &&
  667. currentCond.Reason == condition.Reason && currentCond.Message == condition.Message {
  668. psmetrics.UpdatePushSecretCondition(ps, &condition, 1.0)
  669. return
  670. }
  671. // Do not update lastTransitionTime if the status of the condition doesn't change.
  672. if currentCond != nil && currentCond.Status == condition.Status {
  673. condition.LastTransitionTime = currentCond.LastTransitionTime
  674. }
  675. ps.Status.Conditions = append(FilterOutCondition(ps.Status.Conditions, condition.Type), condition)
  676. if currentCond != nil {
  677. psmetrics.UpdatePushSecretCondition(ps, currentCond, 0.0)
  678. }
  679. psmetrics.UpdatePushSecretCondition(ps, &condition, 1.0)
  680. }
  681. // FilterOutCondition returns an empty set of conditions with the provided type.
  682. func FilterOutCondition(conditions []esapi.PushSecretStatusCondition, condType esapi.PushSecretConditionType) []esapi.PushSecretStatusCondition {
  683. newConditions := make([]esapi.PushSecretStatusCondition, 0, len(conditions))
  684. for _, c := range conditions {
  685. if c.Type == condType {
  686. continue
  687. }
  688. newConditions = append(newConditions, c)
  689. }
  690. return newConditions
  691. }
  692. // GetPushSecretCondition returns the condition with the provided type.
  693. func GetPushSecretCondition(conditions []esapi.PushSecretStatusCondition, condType esapi.PushSecretConditionType) *esapi.PushSecretStatusCondition {
  694. for i := range conditions {
  695. c := conditions[i]
  696. if c.Type == condType {
  697. return &c
  698. }
  699. }
  700. return nil
  701. }
  702. func statusRef(ref esv1.PushSecretData) string {
  703. if ref.GetProperty() != "" {
  704. return ref.GetRemoteKey() + "/" + ref.GetProperty()
  705. }
  706. return ref.GetRemoteKey()
  707. }
  708. // removeUnmanagedStores iterates over all SecretStore references and evaluates the controllerClass property.
  709. // Returns a map containing only managed stores.
  710. func removeUnmanagedStores(ctx context.Context, namespace string, r *Reconciler, ss map[esapi.PushSecretStoreRef]esv1.GenericStore) (map[esapi.PushSecretStoreRef]esv1.GenericStore, error) {
  711. for ref := range ss {
  712. var store esv1.GenericStore
  713. switch ref.Kind {
  714. case esv1.SecretStoreKind:
  715. store = &esv1.SecretStore{}
  716. case esv1.ClusterSecretStoreKind:
  717. store = &esv1.ClusterSecretStore{}
  718. namespace = ""
  719. }
  720. err := r.Client.Get(ctx, types.NamespacedName{
  721. Name: ref.Name,
  722. Namespace: namespace,
  723. }, store)
  724. if err != nil {
  725. return ss, err
  726. }
  727. class := store.GetSpec().Controller
  728. if class != "" && class != r.ControllerClass {
  729. delete(ss, ref)
  730. }
  731. }
  732. return ss, nil
  733. }
  734. // matchKeys filters secret keys based on the provided match pattern.
  735. // If pattern is nil or empty, all keys are matched.
  736. func matchKeys(allKeys []string, match *esapi.PushSecretDataToMatch) ([]string, error) {
  737. if match == nil || match.RegExp == "" {
  738. return allKeys, nil
  739. }
  740. re, err := regexp.Compile(match.RegExp)
  741. if err != nil {
  742. return nil, fmt.Errorf("failed to compile regexp pattern %q: %w", match.RegExp, err)
  743. }
  744. matched := make([]string, 0)
  745. for _, key := range allKeys {
  746. if re.MatchString(key) {
  747. matched = append(matched, key)
  748. }
  749. }
  750. return matched, nil
  751. }
  752. // filterDataToForStore returns dataTo entries that target the given store.
  753. func filterDataToForStore(dataToList []esapi.PushSecretDataTo, storeName, storeKind string, storeLabels map[string]string) ([]esapi.PushSecretDataTo, error) {
  754. filtered := make([]esapi.PushSecretDataTo, 0, len(dataToList))
  755. for i, dataTo := range dataToList {
  756. matches, err := dataToMatchesStore(dataTo, storeName, storeKind, storeLabels)
  757. if err != nil {
  758. return nil, fmt.Errorf("dataTo[%d]: %w", i, err)
  759. }
  760. if matches {
  761. filtered = append(filtered, dataTo)
  762. }
  763. }
  764. return filtered, nil
  765. }
  766. // dataToMatchesStore reports whether a single dataTo entry targets the given store.
  767. func dataToMatchesStore(dataTo esapi.PushSecretDataTo, storeName, storeKind string, storeLabels map[string]string) (bool, error) {
  768. if dataTo.StoreRef == nil {
  769. return false, fmt.Errorf("storeRef is required")
  770. }
  771. refKind := dataTo.StoreRef.Kind
  772. if refKind == "" {
  773. refKind = esv1.SecretStoreKind
  774. }
  775. if dataTo.StoreRef.Name != "" {
  776. return dataTo.StoreRef.Name == storeName && refKind == storeKind, nil
  777. }
  778. if dataTo.StoreRef.LabelSelector == nil {
  779. return false, nil
  780. }
  781. selector, err := metav1.LabelSelectorAsSelector(dataTo.StoreRef.LabelSelector)
  782. if err != nil {
  783. return false, fmt.Errorf("invalid labelSelector: %w", err)
  784. }
  785. return refKind == storeKind && selector.Matches(labels.Set(storeLabels)), nil
  786. }
  787. // expandDataTo expands dataTo entries into individual PushSecretData entries.
  788. //
  789. // Two modes are supported per dataTo entry:
  790. //
  791. // Per-key mode (default, no remoteKey set): each matched key becomes a separate entry
  792. // pushed independently. This enables individual key transformation, per-key status
  793. // tracking, granular deletion, and compatibility with all providers.
  794. //
  795. // Bundle mode (remoteKey set): all matched keys are bundled into a single provider
  796. // secret at the given remoteKey path as a JSON object. A single PushSecretData entry
  797. // with SecretKey="" is produced, and the bundleOverrides map carries the filtered
  798. // key set so only matched keys appear in the pushed JSON blob.
  799. //
  800. // Returns the expanded entries, a bundleOverrides map (remoteKey -> filtered data),
  801. // and any error.
  802. func (r *Reconciler) expandDataTo(secret *v1.Secret, dataToList []esapi.PushSecretDataTo) ([]esapi.PushSecretData, map[string]map[string][]byte, error) {
  803. if len(dataToList) == 0 {
  804. return nil, nil, nil
  805. }
  806. allData := make([]esapi.PushSecretData, 0)
  807. bundleOverrides := make(map[string]map[string][]byte)
  808. overallRemoteKeys := make(map[string]string)
  809. for i, dataTo := range dataToList {
  810. entries, keyMap, filteredData, err := r.expandSingleDataTo(secret, dataTo)
  811. if err != nil {
  812. return nil, nil, fmt.Errorf("dataTo[%d]: %w", i, err)
  813. }
  814. if len(entries) == 0 {
  815. r.Log.Info("dataTo entry matched no keys", "index", i)
  816. continue
  817. }
  818. if err := registerRemoteKeys(overallRemoteKeys, keyMap, i); err != nil {
  819. return nil, nil, err
  820. }
  821. recordBundleOverrides(bundleOverrides, entries, filteredData)
  822. allData = append(allData, entries...)
  823. r.Log.Info("expanded dataTo entry", "index", i, "matchedKeys", len(entries), "created", len(keyMap))
  824. }
  825. return allData, bundleOverrides, nil
  826. }
  827. // registerRemoteKeys checks for duplicate remote keys across dataTo entries and
  828. // records new mappings. Returns an error if a duplicate is found.
  829. func registerRemoteKeys(seen, keyMap map[string]string, index int) error {
  830. for sourceKey, remoteKey := range keyMap {
  831. if existingSource, exists := seen[remoteKey]; exists {
  832. return fmt.Errorf("dataTo[%d]: duplicate remote key %q from source key %q (conflicts with %s)", index, remoteKey, sourceKey, existingSource)
  833. }
  834. seen[remoteKey] = fmt.Sprintf("dataTo[%d]:%s", index, sourceKey)
  835. }
  836. return nil
  837. }
  838. // recordBundleOverrides associates filtered data with bundle entries so only
  839. // matched keys appear in the pushed JSON blob.
  840. func recordBundleOverrides(overrides map[string]map[string][]byte, entries []esapi.PushSecretData, filteredData map[string][]byte) {
  841. if filteredData == nil {
  842. return
  843. }
  844. for _, entry := range entries {
  845. overrides[statusRef(entry)] = filteredData
  846. }
  847. }
  848. // expandSingleDataTo processes a single dataTo entry: converts keys, matches them
  849. // against the pattern, applies rewrites, validates remote keys, and builds the
  850. // resulting PushSecretData entries along with the source-to-remote key mapping.
  851. //
  852. // Bundle mode: when dataTo.RemoteKey is set, all matched keys are bundled into a
  853. // single PushSecretData entry with SecretKey="" targeting dataTo.RemoteKey. The
  854. // third return value carries the filtered (matched+converted) key data so that
  855. // only matched keys appear in the JSON blob pushed to the provider.
  856. //
  857. // Per-key mode: when dataTo.RemoteKey is empty, one PushSecretData entry is
  858. // produced per matched key. The third return value is nil.
  859. func (r *Reconciler) expandSingleDataTo(secret *v1.Secret, dataTo esapi.PushSecretDataTo) ([]esapi.PushSecretData, map[string]string, map[string][]byte, error) {
  860. if dataTo.RemoteKey != "" && len(dataTo.Rewrite) > 0 {
  861. return nil, nil, nil, fmt.Errorf("remoteKey and rewrite are mutually exclusive: rewrite is only supported in per-key mode (without remoteKey)")
  862. }
  863. convertedData, err := esutils.ReverseKeys(dataTo.ConversionStrategy, secret.Data)
  864. if err != nil {
  865. return nil, nil, nil, fmt.Errorf("conversion failed: %w", err)
  866. }
  867. // Map converted keys back to the original K8s secret keys. The resulting
  868. // PushSecretData entries store the original key so that
  869. // resolveSourceKeyConflicts can compare dataTo entries against explicit
  870. // data entries in the same key space. ConversionStrategy is set to None on
  871. // expanded entries because the conversion was already applied during
  872. // matching and rewriting; handlePushSecretDataForStore will look up the
  873. // original key directly in the unconverted secret data.
  874. convertedToOriginal := make(map[string]string, len(secret.Data))
  875. for origKey := range secret.Data {
  876. convKey := esutils.ReverseKey(dataTo.ConversionStrategy, origKey)
  877. convertedToOriginal[convKey] = origKey
  878. }
  879. allKeys := make([]string, 0, len(convertedData))
  880. for key := range convertedData {
  881. allKeys = append(allKeys, key)
  882. }
  883. slices.Sort(allKeys)
  884. matchedKeys, err := matchKeys(allKeys, dataTo.Match)
  885. if err != nil {
  886. return nil, nil, nil, fmt.Errorf("match failed: %w", err)
  887. }
  888. if len(matchedKeys) == 0 {
  889. return nil, nil, nil, nil
  890. }
  891. matchedData := make(map[string][]byte, len(matchedKeys))
  892. for _, key := range matchedKeys {
  893. matchedData[key] = convertedData[key]
  894. }
  895. if dataTo.RemoteKey != "" {
  896. keyMap := map[string]string{bundleSourceKey: dataTo.RemoteKey}
  897. entry := esapi.PushSecretData{
  898. Match: esapi.PushSecretMatch{
  899. SecretKey: "",
  900. RemoteRef: esapi.PushSecretRemoteRef{
  901. RemoteKey: dataTo.RemoteKey,
  902. },
  903. },
  904. Metadata: dataTo.Metadata,
  905. ConversionStrategy: esapi.PushSecretConversionNone,
  906. }
  907. return []esapi.PushSecretData{entry}, keyMap, matchedData, nil
  908. }
  909. keyMap, err := rewriteWithKeyMapping(dataTo.Rewrite, matchedData)
  910. if err != nil {
  911. return nil, nil, nil, fmt.Errorf("rewrite failed: %w", err)
  912. }
  913. for sourceKey, remoteKey := range keyMap {
  914. if remoteKey == "" {
  915. return nil, nil, nil, fmt.Errorf("empty remote key produced for source key %q", sourceKey)
  916. }
  917. }
  918. sortedKeys := slices.Sorted(maps.Keys(keyMap))
  919. entries := make([]esapi.PushSecretData, 0, len(keyMap))
  920. for _, convertedKey := range sortedKeys {
  921. entries = append(entries, esapi.PushSecretData{
  922. Match: esapi.PushSecretMatch{
  923. SecretKey: convertedToOriginal[convertedKey],
  924. RemoteRef: esapi.PushSecretRemoteRef{
  925. RemoteKey: keyMap[convertedKey],
  926. },
  927. },
  928. Metadata: dataTo.Metadata,
  929. ConversionStrategy: esapi.PushSecretConversionNone,
  930. })
  931. }
  932. return entries, keyMap, nil, nil
  933. }
  934. // validateDataToStoreRefs checks that each dataTo entry has a valid storeRef.
  935. func validateDataToStoreRefs(dataToList []esapi.PushSecretDataTo, storeRefs []esapi.PushSecretStoreRef) error {
  936. for i, d := range dataToList {
  937. if d.StoreRef == nil {
  938. return fmt.Errorf("dataTo[%d]: storeRef is required", i)
  939. }
  940. if d.StoreRef.Name == "" && d.StoreRef.LabelSelector == nil {
  941. return fmt.Errorf("dataTo[%d]: storeRef must have name or labelSelector", i)
  942. }
  943. if d.StoreRef.Name != "" && !storeRefExistsInList(d.StoreRef, storeRefs) {
  944. return fmt.Errorf("dataTo[%d]: storeRef %q not found in secretStoreRefs", i, d.StoreRef.Name)
  945. }
  946. }
  947. return nil
  948. }
  949. // storeRefExistsInList checks if a named ref matches any named entry in storeRefs.
  950. func storeRefExistsInList(ref *esapi.PushSecretStoreRef, storeRefs []esapi.PushSecretStoreRef) bool {
  951. refKind := ref.Kind
  952. if refKind == "" {
  953. refKind = esv1.SecretStoreKind
  954. }
  955. for _, sr := range storeRefs {
  956. if sr.Name == "" {
  957. continue
  958. }
  959. srKind := sr.Kind
  960. if srKind == "" {
  961. srKind = esv1.SecretStoreKind
  962. }
  963. if srKind == refKind && sr.Name == ref.Name {
  964. return true
  965. }
  966. }
  967. return false
  968. }
  969. // validateDataToMatchesResolvedStores checks that every dataTo entry with a
  970. // labelSelector actually matches at least one resolved store. Without this,
  971. // a misconfigured labelSelector silently becomes a no-op.
  972. func validateDataToMatchesResolvedStores(dataToList []esapi.PushSecretDataTo, stores map[esapi.PushSecretStoreRef]esv1.GenericStore) error {
  973. for i, dataTo := range dataToList {
  974. if dataTo.StoreRef == nil || dataTo.StoreRef.LabelSelector == nil {
  975. continue
  976. }
  977. if dataTo.StoreRef.Name != "" {
  978. continue
  979. }
  980. selector, err := metav1.LabelSelectorAsSelector(dataTo.StoreRef.LabelSelector)
  981. if err != nil {
  982. return fmt.Errorf("dataTo[%d]: invalid labelSelector: %w", i, err)
  983. }
  984. refKind := dataTo.StoreRef.Kind
  985. if refKind == "" {
  986. refKind = esv1.SecretStoreKind
  987. }
  988. if !anyStoreMatchesSelector(refKind, selector, stores) {
  989. return fmt.Errorf("dataTo[%d]: labelSelector does not match any store in secretStoreRefs", i)
  990. }
  991. }
  992. return nil
  993. }
  994. // anyStoreMatchesSelector returns true if at least one resolved store matches
  995. // the given kind and label selector.
  996. func anyStoreMatchesSelector(kind string, selector labels.Selector, stores map[esapi.PushSecretStoreRef]esv1.GenericStore) bool {
  997. for ref, store := range stores {
  998. if ref.Kind == kind && selector.Matches(labels.Set(store.GetLabels())) {
  999. return true
  1000. }
  1001. }
  1002. return false
  1003. }
  1004. // rewriteWithKeyMapping applies rewrites and returns originalKey -> rewrittenKey mapping.
  1005. func rewriteWithKeyMapping(rewrites []esapi.PushSecretRewrite, data map[string][]byte) (map[string]string, error) {
  1006. keyMap := make(map[string]string, len(data))
  1007. for k := range data {
  1008. keyMap[k] = k
  1009. }
  1010. for i, op := range rewrites {
  1011. applyFn, err := compileRewrite(op)
  1012. if err != nil {
  1013. return nil, fmt.Errorf("rewrite[%d]: %w", i, err)
  1014. }
  1015. newKeyMap := make(map[string]string, len(keyMap))
  1016. for origKey, currentKey := range keyMap {
  1017. newKey, err := applyFn(currentKey)
  1018. if err != nil {
  1019. return nil, fmt.Errorf("rewrite[%d] on key %q: %w", i, currentKey, err)
  1020. }
  1021. newKeyMap[origKey] = newKey
  1022. }
  1023. keyMap = newKeyMap
  1024. }
  1025. return keyMap, nil
  1026. }
  1027. // compileRewrite pre-compiles a rewrite operation (regexp or template) and
  1028. // returns a function that applies it to a key. This avoids re-compiling the
  1029. // same regexp or re-parsing the same template for every key.
  1030. func compileRewrite(op esapi.PushSecretRewrite) (func(string) (string, error), error) {
  1031. switch {
  1032. case op.Regexp != nil:
  1033. re, err := regexp.Compile(op.Regexp.Source)
  1034. if err != nil {
  1035. return nil, fmt.Errorf("invalid regexp %q: %w", op.Regexp.Source, err)
  1036. }
  1037. target := op.Regexp.Target
  1038. return func(key string) (string, error) {
  1039. return re.ReplaceAllString(key, target), nil
  1040. }, nil
  1041. case op.Transform != nil:
  1042. tmpl, err := template.New("t").Funcs(estemplate.FuncMap()).Parse(op.Transform.Template)
  1043. if err != nil {
  1044. return nil, fmt.Errorf("invalid template: %w", err)
  1045. }
  1046. return func(key string) (string, error) {
  1047. var buf bytes.Buffer
  1048. if err := tmpl.Execute(&buf, map[string]string{"value": key}); err != nil {
  1049. return "", fmt.Errorf("template exec: %w", err)
  1050. }
  1051. return buf.String(), nil
  1052. }, nil
  1053. default:
  1054. return func(key string) (string, error) { return key, nil }, nil
  1055. }
  1056. }
  1057. // resolveSourceKeyConflicts merges dataTo and explicit data entries.
  1058. // When both reference the same source secret key, explicit data wins.
  1059. // Comparison is done using the original (raw) K8s secret key. DataTo entries
  1060. // already store the original key; explicit data entries may store a converted
  1061. // key when ConversionStrategy is set, so we normalize them via the secret.
  1062. func resolveSourceKeyConflicts(dataToEntries, explicitData []esapi.PushSecretData, secret *v1.Secret) []esapi.PushSecretData {
  1063. explicitOriginalKeys := make(map[string]struct{}, len(explicitData))
  1064. for _, data := range explicitData {
  1065. origKey := resolveOriginalKey(data, secret)
  1066. explicitOriginalKeys[origKey] = struct{}{}
  1067. }
  1068. result := make([]esapi.PushSecretData, 0, len(dataToEntries)+len(explicitData))
  1069. for _, data := range dataToEntries {
  1070. if _, exists := explicitOriginalKeys[data.GetSecretKey()]; !exists {
  1071. result = append(result, data)
  1072. }
  1073. }
  1074. return append(result, explicitData...)
  1075. }
  1076. // resolveOriginalKey returns the raw K8s secret key for a PushSecretData entry.
  1077. // If the entry uses a ConversionStrategy, SecretKey is the converted (decoded)
  1078. // form, so we find the original key by converting each raw key and matching.
  1079. // If no conversion is active, SecretKey is already the original key.
  1080. func resolveOriginalKey(data esapi.PushSecretData, secret *v1.Secret) string {
  1081. key := data.GetSecretKey()
  1082. if data.ConversionStrategy == "" || data.ConversionStrategy == esapi.PushSecretConversionNone {
  1083. return key
  1084. }
  1085. for origKey := range secret.Data {
  1086. if esutils.ReverseKey(data.ConversionStrategy, origKey) == key {
  1087. return origKey
  1088. }
  1089. }
  1090. return key
  1091. }
  1092. // validateRemoteKeyUniqueness ensures no two entries push to the same remote location.
  1093. // The remote location is defined by (remoteKey, property) tuple.
  1094. func validateRemoteKeyUniqueness(entries []esapi.PushSecretData) error {
  1095. type remoteLocation struct {
  1096. remoteKey string
  1097. property string
  1098. }
  1099. seen := make(map[remoteLocation]string) // location -> source key (for error message)
  1100. for _, data := range entries {
  1101. loc := remoteLocation{
  1102. remoteKey: data.GetRemoteKey(),
  1103. property: data.GetProperty(),
  1104. }
  1105. sourceKey := data.GetSecretKey()
  1106. if existingSource, exists := seen[loc]; exists {
  1107. if loc.property != "" {
  1108. return fmt.Errorf(
  1109. "duplicate remote key %q with property %q: source keys %q and %q both map to the same destination",
  1110. loc.remoteKey, loc.property, existingSource, sourceKey)
  1111. }
  1112. return fmt.Errorf(
  1113. "duplicate remote key %q: source keys %q and %q both map to the same destination",
  1114. loc.remoteKey, existingSource, sourceKey)
  1115. }
  1116. seen[loc] = sourceKey
  1117. }
  1118. return nil
  1119. }
  1120. // mergeDataEntries combines dataTo and explicit data entries.
  1121. // It resolves source key conflicts (explicit wins) and validates no duplicate remote destinations.
  1122. func mergeDataEntries(dataToEntries, explicitData []esapi.PushSecretData, secret *v1.Secret) ([]esapi.PushSecretData, error) {
  1123. merged := resolveSourceKeyConflicts(dataToEntries, explicitData, secret)
  1124. if err := validateRemoteKeyUniqueness(merged); err != nil {
  1125. return nil, err
  1126. }
  1127. return merged, nil
  1128. }