| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292 |
- /*
- Copyright © 2025 ESO Maintainer Team
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- https://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package externalsecret
- import (
- "context"
- "encoding/json"
- "errors"
- "fmt"
- "strconv"
- v1 "k8s.io/api/core/v1"
- apiextensions "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
- esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
- genv1alpha1 "github.com/external-secrets/external-secrets/apis/generators/v1alpha1"
- "github.com/external-secrets/external-secrets/pkg/controllers/secretstore"
- "github.com/external-secrets/external-secrets/pkg/generator/statemanager"
- "github.com/external-secrets/external-secrets/pkg/utils"
- "github.com/external-secrets/external-secrets/pkg/utils/resolvers"
- // Loading registered generators.
- _ "github.com/external-secrets/external-secrets/pkg/generator/register"
- _ "github.com/external-secrets/external-secrets/pkg/provider/register"
- )
- // getProviderSecretData returns the provider's secret data with the provided ExternalSecret.
- func (r *Reconciler) GetProviderSecretData(ctx context.Context, externalSecret *esv1.ExternalSecret) (providerData map[string][]byte, err error) {
- // We MUST NOT create multiple instances of a provider client (mostly due to limitations with GCP)
- // Clientmanager keeps track of the client instances
- // that are created during the fetching process and closes clients
- // if needed.
- mgr := secretstore.NewManager(r.Client, r.ControllerClass, r.EnableFloodGate)
- defer func() {
- _ = mgr.Close(ctx)
- }()
- // statemanager takes care of managing the state of the generators.
- // Since ExternalSecrets can have multiple generators, we need to keep track of the state of each generator
- // and if one fails we need to rollback all generated values from this iteration.
- var genState *statemanager.Manager
- if r.EnableGeneratorState {
- genState = statemanager.New(ctx, r.Client, r.Scheme, externalSecret.Namespace, externalSecret)
- defer func() {
- // NoSecretErr does not make sense for the generator state.
- // A generator is expected to always generate a secret.
- // If it doesn't, it should return an error.
- // If the error is NoSecretErr, we should commit the generator state.
- if err != nil && !errors.Is(err, esv1.NoSecretErr) {
- if rollBackErr := genState.Rollback(); rollBackErr != nil {
- r.Log.Error(rollBackErr, "error rolling back generator state")
- }
- return
- }
- if commitErr := genState.Commit(); commitErr != nil {
- r.Log.Error(commitErr, "error committing generator state")
- // At this point the original error can only be a NoSecretErr
- // but we should return the commit error here as it's more important.
- err = commitErr
- }
- }()
- }
- providerData = make(map[string][]byte)
- for i, remoteRef := range externalSecret.Spec.DataFrom {
- var secretMap map[string][]byte
- if remoteRef.Find != nil {
- secretMap, err = r.handleFindAllSecrets(ctx, externalSecret, remoteRef, mgr, genState, i)
- if err != nil {
- err = fmt.Errorf("error processing spec.dataFrom[%d].find, err: %w", i, err)
- }
- } else if remoteRef.Extract != nil {
- secretMap, err = r.handleExtractSecrets(ctx, externalSecret, remoteRef, mgr, genState, i)
- if err != nil {
- err = fmt.Errorf("error processing spec.dataFrom[%d].extract, err: %w", i, err)
- }
- } else if remoteRef.SourceRef != nil && remoteRef.SourceRef.GeneratorRef != nil {
- secretMap, err = r.handleGenerateSecrets(ctx, externalSecret.Namespace, remoteRef, i, genState)
- if err != nil {
- err = fmt.Errorf("error processing spec.dataFrom[%d].sourceRef.generatorRef, err: %w", i, err)
- }
- }
- if errors.Is(err, esv1.NoSecretErr) && externalSecret.Spec.Target.DeletionPolicy != esv1.DeletionPolicyRetain {
- r.recorder.Eventf(externalSecret, v1.EventTypeNormal, esv1.ReasonMissingProviderSecret, eventMissingProviderSecret, i)
- continue
- }
- if err != nil {
- return nil, err
- }
- providerData = utils.MergeByteMap(providerData, secretMap)
- }
- for i, secretRef := range externalSecret.Spec.Data {
- err := r.handleSecretData(ctx, externalSecret, secretRef, providerData, mgr)
- if errors.Is(err, esv1.NoSecretErr) && externalSecret.Spec.Target.DeletionPolicy != esv1.DeletionPolicyRetain {
- r.recorder.Eventf(externalSecret, v1.EventTypeNormal, esv1.ReasonMissingProviderSecret, eventMissingProviderSecretKey, i, secretRef.RemoteRef.Key)
- continue
- }
- if err != nil {
- return nil, fmt.Errorf("error processing spec.data[%d] (key: %s), err: %w", i, secretRef.RemoteRef.Key, err)
- }
- }
- return providerData, nil
- }
- func (r *Reconciler) handleSecretData(ctx context.Context, externalSecret *esv1.ExternalSecret, secretRef esv1.ExternalSecretData, providerData map[string][]byte, cmgr *secretstore.Manager) error {
- client, err := cmgr.Get(ctx, externalSecret.Spec.SecretStoreRef, externalSecret.Namespace, toStoreGenSourceRef(secretRef.SourceRef))
- if err != nil {
- return err
- }
- // get a single secret from the store
- secretData, err := client.GetSecret(ctx, secretRef.RemoteRef)
- if err != nil {
- return err
- }
- // decode the secret if needed
- secretData, err = utils.Decode(secretRef.RemoteRef.DecodingStrategy, secretData)
- if err != nil {
- return fmt.Errorf(errDecode, secretRef.RemoteRef.DecodingStrategy, err)
- }
- // store the secret data
- providerData[secretRef.SecretKey] = secretData
- return nil
- }
- func toStoreGenSourceRef(ref *esv1.StoreSourceRef) *esv1.StoreGeneratorSourceRef {
- if ref == nil {
- return nil
- }
- return &esv1.StoreGeneratorSourceRef{
- SecretStoreRef: &ref.SecretStoreRef,
- }
- }
- func (r *Reconciler) handleGenerateSecrets(ctx context.Context, namespace string, remoteRef esv1.ExternalSecretDataFromRemoteRef, i int, generatorState *statemanager.Manager) (map[string][]byte, error) {
- impl, generatorResource, err := resolvers.GeneratorRef(ctx, r.Client, r.Scheme, namespace, remoteRef.SourceRef.GeneratorRef)
- if err != nil {
- return nil, err
- }
- var latestState *genv1alpha1.GeneratorState
- if generatorState != nil {
- latestState, err = generatorState.GetLatestState(generatorStateKey(i))
- if err != nil {
- return nil, fmt.Errorf("unable to get latest state: %w", err)
- }
- }
- secretMap, newState, err := impl.Generate(ctx, generatorResource, r.Client, namespace)
- if err != nil {
- return nil, fmt.Errorf(errGenerate, err)
- }
- if latestState != nil {
- if generatorState != nil {
- generatorState.EnqueueMoveStateToGC(generatorStateKey(i))
- }
- }
- if generatorState != nil {
- generatorState.EnqueueSetLatest(ctx, generatorStateKey(i), namespace, generatorResource, impl, newState)
- }
- // rewrite the keys if needed
- secretMap, err = utils.RewriteMap(remoteRef.Rewrite, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errRewrite, err)
- }
- // validate the keys
- err = utils.ValidateKeys(r.Log, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errInvalidKeys, err)
- }
- return secretMap, err
- }
- // We're using the index of the generator as the key for the generator state
- // this is because we can have multiple generators in the same ExternalSecret
- // and we need to keep track of the state of each generator.
- func generatorStateKey(i int) string {
- return strconv.Itoa(i)
- }
- func (r *Reconciler) handleExtractSecrets(ctx context.Context, externalSecret *esv1.ExternalSecret, remoteRef esv1.ExternalSecretDataFromRemoteRef, cmgr *secretstore.Manager, genState *statemanager.Manager, i int) (map[string][]byte, error) {
- client, err := cmgr.Get(ctx, externalSecret.Spec.SecretStoreRef, externalSecret.Namespace, remoteRef.SourceRef)
- if err != nil {
- return nil, err
- }
- // get multiple secrets from the store
- secretMap, err := client.GetSecretMap(ctx, *remoteRef.Extract)
- if err != nil {
- return nil, err
- }
- // rewrite the keys if needed
- secretMap, err = utils.RewriteMap(remoteRef.Rewrite, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errRewrite, err)
- }
- if len(remoteRef.Rewrite) == 0 {
- secretMap, err = utils.ConvertKeys(remoteRef.Extract.ConversionStrategy, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errConvert, remoteRef.Extract.ConversionStrategy, err)
- }
- }
- // validate the keys
- err = utils.ValidateKeys(r.Log, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errInvalidKeys, err)
- }
- // decode the secrets if needed
- secretMap, err = utils.DecodeMap(remoteRef.Extract.DecodingStrategy, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errDecode, remoteRef.Extract.DecodingStrategy, err)
- }
- if genState != nil {
- genState.EnqueueFlagLatestStateForGC(generatorStateKey(i))
- }
- return secretMap, nil
- }
- func (r *Reconciler) handleFindAllSecrets(ctx context.Context, externalSecret *esv1.ExternalSecret, remoteRef esv1.ExternalSecretDataFromRemoteRef, cmgr *secretstore.Manager, genState *statemanager.Manager, i int) (map[string][]byte, error) {
- client, err := cmgr.Get(ctx, externalSecret.Spec.SecretStoreRef, externalSecret.Namespace, remoteRef.SourceRef)
- if err != nil {
- return nil, err
- }
- // get all secrets from the store that match the selector
- secretMap, err := client.GetAllSecrets(ctx, *remoteRef.Find)
- if err != nil {
- return nil, fmt.Errorf("error getting all secrets: %w", err)
- }
- // rewrite the keys if needed
- secretMap, err = utils.RewriteMap(remoteRef.Rewrite, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errRewrite, err)
- }
- if len(remoteRef.Rewrite) == 0 {
- secretMap, err = utils.ConvertKeys(remoteRef.Find.ConversionStrategy, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errConvert, remoteRef.Find.ConversionStrategy, err)
- }
- }
- // validate the keys
- err = utils.ValidateKeys(r.Log, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errInvalidKeys, err)
- }
- // decode the secrets if needed
- secretMap, err = utils.DecodeMap(remoteRef.Find.DecodingStrategy, secretMap)
- if err != nil {
- return nil, fmt.Errorf(errDecode, remoteRef.Find.DecodingStrategy, err)
- }
- if genState != nil {
- genState.EnqueueFlagLatestStateForGC(generatorStateKey(i))
- }
- return secretMap, nil
- }
- func shouldSkipGenerator(r *Reconciler, generatorDef *apiextensions.JSON) (bool, error) {
- var genControllerClass genv1alpha1.ControllerClassResource
- err := json.Unmarshal(generatorDef.Raw, &genControllerClass)
- if err != nil {
- return false, err
- }
- var controllerClass = genControllerClass.Spec.ControllerClass
- return controllerClass != "" && controllerClass != r.ControllerClass, nil
- }
|