externalsecret_controller.go 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package externalsecret
  13. import (
  14. "context"
  15. "encoding/json"
  16. "errors"
  17. "fmt"
  18. "strings"
  19. "time"
  20. "github.com/go-logr/logr"
  21. "github.com/prometheus/client_golang/prometheus"
  22. v1 "k8s.io/api/core/v1"
  23. "k8s.io/apimachinery/pkg/api/equality"
  24. apierrors "k8s.io/apimachinery/pkg/api/errors"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/runtime"
  27. "k8s.io/apimachinery/pkg/types"
  28. "k8s.io/client-go/tools/record"
  29. ctrl "sigs.k8s.io/controller-runtime"
  30. "sigs.k8s.io/controller-runtime/pkg/builder"
  31. "sigs.k8s.io/controller-runtime/pkg/client"
  32. "sigs.k8s.io/controller-runtime/pkg/controller"
  33. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  34. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  35. "github.com/external-secrets/external-secrets/pkg/controllers/secretstore"
  36. // Loading registered providers.
  37. _ "github.com/external-secrets/external-secrets/pkg/provider/register"
  38. "github.com/external-secrets/external-secrets/pkg/utils"
  39. )
  40. const (
  41. requeueAfter = time.Second * 30
  42. fieldOwnerTemplate = "externalsecrets.external-secrets.io/%v"
  43. errGetES = "could not get ExternalSecret"
  44. errConvert = "could not apply conversion strategy to keys: %v"
  45. errUpdateSecret = "could not update Secret"
  46. errPatchStatus = "unable to patch status"
  47. errGetSecretStore = "could not get SecretStore %q, %w"
  48. errSecretStoreNotReady = "the desired SecretStore %s is not ready"
  49. errGetClusterSecretStore = "could not get ClusterSecretStore %q, %w"
  50. errStoreRef = "could not get store reference"
  51. errStoreUsability = "could not use store reference"
  52. errStoreProvider = "could not get store provider"
  53. errStoreClient = "could not get provider client"
  54. errGetExistingSecret = "could not get existing secret: %w"
  55. errCloseStoreClient = "could not close provider client"
  56. errSetCtrlReference = "could not set ExternalSecret controller reference: %w"
  57. errFetchTplFrom = "error fetching templateFrom data: %w"
  58. errGetSecretData = "could not get secret data from provider"
  59. errDeleteSecret = "could not delete secret"
  60. errApplyTemplate = "could not apply template: %w"
  61. errExecTpl = "could not execute template: %w"
  62. errInvalidCreatePolicy = "invalid creationPolicy=%s. Can not delete secret i do not own"
  63. errPolicyMergeNotFound = "the desired secret %s was not found. With creationPolicy=Merge the secret won't be created"
  64. errPolicyMergeGetSecret = "unable to get secret %s: %w"
  65. errPolicyMergeMutate = "unable to mutate secret %s: %w"
  66. errPolicyMergePatch = "unable to patch secret %s: %w"
  67. errTplCMMissingKey = "error in configmap %s: missing key %s"
  68. errTplSecMissingKey = "error in secret %s: missing key %s"
  69. )
  70. // Reconciler reconciles a ExternalSecret object.
  71. type Reconciler struct {
  72. client.Client
  73. Log logr.Logger
  74. Scheme *runtime.Scheme
  75. ControllerClass string
  76. RequeueInterval time.Duration
  77. ClusterSecretStoreEnabled bool
  78. EnableFloodGate bool
  79. recorder record.EventRecorder
  80. }
  81. // Reconcile implements the main reconciliation loop
  82. // for watched objects (ExternalSecret, ClusterSecretStore and SecretStore),
  83. // and updates/creates a Kubernetes secret based on them.
  84. func (r *Reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
  85. log := r.Log.WithValues("ExternalSecret", req.NamespacedName)
  86. syncCallsMetricLabels := prometheus.Labels{"name": req.Name, "namespace": req.Namespace}
  87. var externalSecret esv1beta1.ExternalSecret
  88. err := r.Get(ctx, req.NamespacedName, &externalSecret)
  89. if apierrors.IsNotFound(err) {
  90. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  91. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretDeleted, v1.ConditionFalse, esv1beta1.ConditionReasonSecretDeleted, "Secret was deleted")
  92. SetExternalSecretCondition(&esv1beta1.ExternalSecret{
  93. ObjectMeta: metav1.ObjectMeta{
  94. Name: req.Name,
  95. Namespace: req.Namespace,
  96. },
  97. }, *conditionSynced)
  98. return ctrl.Result{}, nil
  99. } else if err != nil {
  100. log.Error(err, errGetES)
  101. syncCallsError.With(syncCallsMetricLabels).Inc()
  102. return ctrl.Result{}, nil
  103. }
  104. if shouldSkipClusterSecretStore(r, externalSecret) {
  105. log.Info("skipping cluster secret store as it is disabled")
  106. return ctrl.Result{}, nil
  107. }
  108. // patch status when done processing
  109. p := client.MergeFrom(externalSecret.DeepCopy())
  110. defer func() {
  111. err = r.Status().Patch(ctx, &externalSecret, p)
  112. if err != nil {
  113. log.Error(err, errPatchStatus)
  114. }
  115. }()
  116. store, err := r.getStore(ctx, &externalSecret)
  117. if err != nil {
  118. log.Error(err, errStoreRef)
  119. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonInvalidStoreRef, err.Error())
  120. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errStoreRef)
  121. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  122. syncCallsError.With(syncCallsMetricLabels).Inc()
  123. return ctrl.Result{}, err
  124. }
  125. log = log.WithValues("SecretStore", store.GetNamespacedName())
  126. // check if store should be handled by this controller instance
  127. if !secretstore.ShouldProcessStore(store, r.ControllerClass) {
  128. log.Info("skipping unmanaged store")
  129. return ctrl.Result{}, nil
  130. }
  131. if r.EnableFloodGate {
  132. if err = assertStoreIsUsable(store); err != nil {
  133. log.Error(err, errStoreUsability)
  134. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonUnavailableStore, err.Error())
  135. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errStoreUsability)
  136. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  137. syncCallsError.With(syncCallsMetricLabels).Inc()
  138. return ctrl.Result{}, err
  139. }
  140. }
  141. storeProvider, err := esv1beta1.GetProvider(store)
  142. if err != nil {
  143. log.Error(err, errStoreProvider)
  144. syncCallsError.With(syncCallsMetricLabels).Inc()
  145. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  146. }
  147. refreshInt := r.RequeueInterval
  148. if externalSecret.Spec.RefreshInterval != nil {
  149. refreshInt = externalSecret.Spec.RefreshInterval.Duration
  150. }
  151. // Target Secret Name should default to the ExternalSecret name if not explicitly specified
  152. secretName := externalSecret.Spec.Target.Name
  153. if secretName == "" {
  154. secretName = externalSecret.ObjectMeta.Name
  155. }
  156. // fetch external secret, we need to ensure that it exists, and it's hashmap corresponds
  157. var existingSecret v1.Secret
  158. err = r.Get(ctx, types.NamespacedName{
  159. Name: secretName,
  160. Namespace: externalSecret.Namespace,
  161. }, &existingSecret)
  162. if err != nil && !apierrors.IsNotFound(err) {
  163. log.Error(err, errGetExistingSecret)
  164. }
  165. // refresh should be skipped if
  166. // 1. resource generation hasn't changed
  167. // 2. refresh interval is 0
  168. // 3. if we're still within refresh-interval
  169. if !shouldRefresh(externalSecret) && isSecretValid(existingSecret) {
  170. log.V(1).Info("skipping refresh", "rv", getResourceVersion(externalSecret))
  171. return ctrl.Result{RequeueAfter: refreshInt}, nil
  172. }
  173. if !shouldReconcile(externalSecret) {
  174. log.V(1).Info("stopping reconciling", "rv", getResourceVersion(externalSecret))
  175. return ctrl.Result{
  176. RequeueAfter: 0,
  177. Requeue: false,
  178. }, nil
  179. }
  180. // secret client is created only if we are going to refresh
  181. // this skip an unnecessary check/request in the case we are not going to do anything
  182. secretClient, err := storeProvider.NewClient(ctx, store, r.Client, req.Namespace)
  183. if err != nil {
  184. log.Error(err, errStoreClient)
  185. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errStoreClient)
  186. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  187. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonProviderClientConfig, err.Error())
  188. syncCallsError.With(syncCallsMetricLabels).Inc()
  189. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  190. }
  191. defer func() {
  192. err = secretClient.Close(ctx)
  193. if err != nil {
  194. log.Error(err, errCloseStoreClient)
  195. }
  196. }()
  197. secret := &v1.Secret{
  198. ObjectMeta: metav1.ObjectMeta{
  199. Name: secretName,
  200. Namespace: externalSecret.Namespace,
  201. },
  202. Immutable: &externalSecret.Spec.Target.Immutable,
  203. Data: make(map[string][]byte),
  204. }
  205. dataMap, err := r.getProviderSecretData(ctx, secretClient, &externalSecret)
  206. if err != nil {
  207. log.Error(err, errGetSecretData)
  208. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonUpdateFailed, err.Error())
  209. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errGetSecretData)
  210. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  211. syncCallsError.With(syncCallsMetricLabels).Inc()
  212. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  213. }
  214. // if no data was found we can delete the secret if needed.
  215. if len(dataMap) == 0 {
  216. switch externalSecret.Spec.Target.DeletionPolicy {
  217. // delete secret and return early.
  218. case esv1beta1.DeletionPolicyDelete:
  219. // safeguard that we only can delete secrets we own
  220. // this is also implemented in the es validation webhook
  221. if externalSecret.Spec.Target.CreationPolicy != esv1beta1.CreatePolicyOwner {
  222. err := fmt.Errorf(errInvalidCreatePolicy, externalSecret.Spec.Target.CreationPolicy)
  223. log.Error(err, errDeleteSecret)
  224. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonUpdateFailed, err.Error())
  225. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errDeleteSecret)
  226. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  227. syncCallsError.With(syncCallsMetricLabels).Inc()
  228. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  229. }
  230. err = r.Delete(ctx, secret)
  231. if err != nil && !apierrors.IsNotFound(err) {
  232. log.Error(err, errDeleteSecret)
  233. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonUpdateFailed, err.Error())
  234. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errDeleteSecret)
  235. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  236. syncCallsError.With(syncCallsMetricLabels).Inc()
  237. }
  238. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionTrue, esv1beta1.ConditionReasonSecretDeleted, "secret deleted due to DeletionPolicy")
  239. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  240. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  241. case esv1beta1.DeletionPolicyMerge:
  242. // noop, handled below
  243. // In case provider secrets don't exist the kubernetes secret will be kept as-is.
  244. case esv1beta1.DeletionPolicyRetain:
  245. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  246. }
  247. }
  248. mutationFunc := func() error {
  249. if externalSecret.Spec.Target.CreationPolicy == esv1beta1.CreatePolicyOwner {
  250. err = controllerutil.SetControllerReference(&externalSecret, &secret.ObjectMeta, r.Scheme)
  251. if err != nil {
  252. return fmt.Errorf(errSetCtrlReference, err)
  253. }
  254. }
  255. if secret.Data == nil {
  256. secret.Data = make(map[string][]byte)
  257. }
  258. err = r.applyTemplate(ctx, &externalSecret, secret, dataMap)
  259. if err != nil {
  260. return fmt.Errorf(errApplyTemplate, err)
  261. }
  262. // diff existing keys
  263. if externalSecret.Spec.Target.DeletionPolicy == esv1beta1.DeletionPolicyMerge {
  264. keys, err := getManagedKeys(&existingSecret, externalSecret.Name)
  265. if err != nil {
  266. return err
  267. }
  268. for _, key := range keys {
  269. if dataMap[key] == nil {
  270. secret.Data[key] = nil
  271. }
  272. }
  273. }
  274. return nil
  275. }
  276. // nolint
  277. switch externalSecret.Spec.Target.CreationPolicy {
  278. case esv1beta1.CreatePolicyMerge:
  279. err = patchSecret(ctx, r.Client, r.Scheme, secret, mutationFunc, externalSecret.Name)
  280. case esv1beta1.CreatePolicyNone:
  281. log.V(1).Info("secret creation skipped due to creationPolicy=None")
  282. err = nil
  283. default:
  284. _, err = ctrl.CreateOrUpdate(ctx, r.Client, secret, mutationFunc)
  285. }
  286. if err != nil {
  287. log.Error(err, errUpdateSecret)
  288. r.recorder.Event(&externalSecret, v1.EventTypeWarning, esv1beta1.ReasonUpdateFailed, err.Error())
  289. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionFalse, esv1beta1.ConditionReasonSecretSyncedError, errUpdateSecret)
  290. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  291. syncCallsError.With(syncCallsMetricLabels).Inc()
  292. return ctrl.Result{}, err
  293. }
  294. r.recorder.Event(&externalSecret, v1.EventTypeNormal, esv1beta1.ReasonUpdated, "Updated Secret")
  295. conditionSynced := NewExternalSecretCondition(esv1beta1.ExternalSecretReady, v1.ConditionTrue, esv1beta1.ConditionReasonSecretSynced, "Secret was synced")
  296. currCond := GetExternalSecretCondition(externalSecret.Status, esv1beta1.ExternalSecretReady)
  297. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  298. externalSecret.Status.RefreshTime = metav1.NewTime(time.Now())
  299. externalSecret.Status.SyncedResourceVersion = getResourceVersion(externalSecret)
  300. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  301. if currCond == nil || currCond.Status != conditionSynced.Status {
  302. log.Info("reconciled secret") // Log once if on success in any verbosity
  303. } else {
  304. log.V(1).Info("reconciled secret") // Log all reconciliation cycles if higher verbosity applied
  305. }
  306. return ctrl.Result{
  307. RequeueAfter: refreshInt,
  308. }, nil
  309. }
  310. func patchSecret(ctx context.Context, c client.Client, scheme *runtime.Scheme, secret *v1.Secret, mutationFunc func() error, fieldOwner string) error {
  311. fqdn := fmt.Sprintf(fieldOwnerTemplate, fieldOwner)
  312. err := c.Get(ctx, client.ObjectKeyFromObject(secret), secret.DeepCopy())
  313. if apierrors.IsNotFound(err) {
  314. return fmt.Errorf(errPolicyMergeNotFound, secret.Name)
  315. }
  316. if err != nil {
  317. return fmt.Errorf(errPolicyMergeGetSecret, secret.Name, err)
  318. }
  319. existing := secret.DeepCopyObject()
  320. err = mutationFunc()
  321. if err != nil {
  322. return fmt.Errorf(errPolicyMergeMutate, secret.Name, err)
  323. }
  324. // GVK is missing in the Secret, see:
  325. // https://github.com/kubernetes-sigs/controller-runtime/issues/526
  326. // https://github.com/kubernetes-sigs/controller-runtime/issues/1517
  327. // https://github.com/kubernetes/kubernetes/issues/80609
  328. // we need to manually set it before doing a Patch() as it depends on the GVK
  329. gvks, unversioned, err := scheme.ObjectKinds(secret)
  330. if err != nil {
  331. return err
  332. }
  333. if !unversioned && len(gvks) == 1 {
  334. secret.SetGroupVersionKind(gvks[0])
  335. }
  336. if equality.Semantic.DeepEqual(existing, secret) {
  337. return nil
  338. }
  339. // we're not able to resolve conflicts so we force ownership
  340. // see: https://kubernetes.io/docs/reference/using-api/server-side-apply/#using-server-side-apply-in-a-controller
  341. err = c.Patch(ctx, secret, client.Apply, client.FieldOwner(fqdn), client.ForceOwnership)
  342. if err != nil {
  343. return fmt.Errorf(errPolicyMergePatch, secret.Name, err)
  344. }
  345. return nil
  346. }
  347. func getManagedKeys(secret *v1.Secret, fieldOwner string) ([]string, error) {
  348. fqdn := fmt.Sprintf(fieldOwnerTemplate, fieldOwner)
  349. var keys []string
  350. for _, v := range secret.ObjectMeta.ManagedFields {
  351. if v.Manager != fqdn {
  352. continue
  353. }
  354. fields := make(map[string]interface{})
  355. err := json.Unmarshal(v.FieldsV1.Raw, &fields)
  356. if err != nil {
  357. return nil, fmt.Errorf("error unmarshaling managed fields: %w", err)
  358. }
  359. dataFields := fields["f:data"]
  360. if dataFields == nil {
  361. continue
  362. }
  363. df, ok := dataFields.(map[string]string)
  364. if !ok {
  365. continue
  366. }
  367. for k := range df {
  368. if k == "." {
  369. continue
  370. }
  371. keys = append(keys, strings.TrimPrefix(k, "f:"))
  372. }
  373. }
  374. return keys, nil
  375. }
  376. func getResourceVersion(es esv1beta1.ExternalSecret) string {
  377. return fmt.Sprintf("%d-%s", es.ObjectMeta.GetGeneration(), hashMeta(es.ObjectMeta))
  378. }
  379. func hashMeta(m metav1.ObjectMeta) string {
  380. type meta struct {
  381. annotations map[string]string
  382. labels map[string]string
  383. }
  384. return utils.ObjectHash(meta{
  385. annotations: m.Annotations,
  386. labels: m.Labels,
  387. })
  388. }
  389. func shouldSkipClusterSecretStore(r *Reconciler, es esv1beta1.ExternalSecret) bool {
  390. return !r.ClusterSecretStoreEnabled && es.Spec.SecretStoreRef.Kind == esv1beta1.ClusterSecretStoreKind
  391. }
  392. func shouldRefresh(es esv1beta1.ExternalSecret) bool {
  393. // refresh if resource version changed
  394. if es.Status.SyncedResourceVersion != getResourceVersion(es) {
  395. return true
  396. }
  397. // skip refresh if refresh interval is 0
  398. if es.Spec.RefreshInterval.Duration == 0 && es.Status.SyncedResourceVersion != "" {
  399. return false
  400. }
  401. if es.Status.RefreshTime.IsZero() {
  402. return true
  403. }
  404. return !es.Status.RefreshTime.Add(es.Spec.RefreshInterval.Duration).After(time.Now())
  405. }
  406. func shouldReconcile(es esv1beta1.ExternalSecret) bool {
  407. if es.Spec.Target.Immutable && hasSyncedCondition(es) {
  408. return false
  409. }
  410. return true
  411. }
  412. func hasSyncedCondition(es esv1beta1.ExternalSecret) bool {
  413. for _, condition := range es.Status.Conditions {
  414. if condition.Reason == "SecretSynced" {
  415. return true
  416. }
  417. }
  418. return false
  419. }
  420. // isSecretValid checks if the secret exists, and it's data is consistent with the calculated hash.
  421. func isSecretValid(existingSecret v1.Secret) bool {
  422. // if target secret doesn't exist, or annotations as not set, we need to refresh
  423. if existingSecret.UID == "" || existingSecret.Annotations == nil {
  424. return false
  425. }
  426. // if the calculated hash is different from the calculation, then it's invalid
  427. if existingSecret.Annotations[esv1beta1.AnnotationDataHash] != utils.ObjectHash(existingSecret.Data) {
  428. return false
  429. }
  430. return true
  431. }
  432. // assertStoreIsUsable assert that the store is ready to use.
  433. func assertStoreIsUsable(store esv1beta1.GenericStore) error {
  434. condition := secretstore.GetSecretStoreCondition(store.GetStatus(), esv1beta1.SecretStoreReady)
  435. if condition == nil || condition.Status != v1.ConditionTrue {
  436. return fmt.Errorf(errSecretStoreNotReady, store.GetName())
  437. }
  438. return nil
  439. }
  440. func (r *Reconciler) getStore(ctx context.Context, externalSecret *esv1beta1.ExternalSecret) (esv1beta1.GenericStore, error) {
  441. ref := types.NamespacedName{
  442. Name: externalSecret.Spec.SecretStoreRef.Name,
  443. }
  444. if externalSecret.Spec.SecretStoreRef.Kind == esv1beta1.ClusterSecretStoreKind {
  445. var store esv1beta1.ClusterSecretStore
  446. err := r.Get(ctx, ref, &store)
  447. if err != nil {
  448. return nil, fmt.Errorf(errGetClusterSecretStore, ref.Name, err)
  449. }
  450. return &store, nil
  451. }
  452. ref.Namespace = externalSecret.Namespace
  453. var store esv1beta1.SecretStore
  454. err := r.Get(ctx, ref, &store)
  455. if err != nil {
  456. return nil, fmt.Errorf(errGetSecretStore, ref.Name, err)
  457. }
  458. return &store, nil
  459. }
  460. // getProviderSecretData returns the provider's secret data with the provided ExternalSecret.
  461. func (r *Reconciler) getProviderSecretData(ctx context.Context, providerClient esv1beta1.SecretsClient, externalSecret *esv1beta1.ExternalSecret) (map[string][]byte, error) {
  462. providerData := make(map[string][]byte)
  463. for i, remoteRef := range externalSecret.Spec.DataFrom {
  464. var secretMap map[string][]byte
  465. var err error
  466. if remoteRef.Find != nil {
  467. secretMap, err = providerClient.GetAllSecrets(ctx, *remoteRef.Find)
  468. if errors.Is(err, esv1beta1.NoSecretErr) && externalSecret.Spec.Target.DeletionPolicy != esv1beta1.DeletionPolicyRetain {
  469. r.recorder.Event(externalSecret, v1.EventTypeNormal, esv1beta1.ReasonDeleted, fmt.Sprintf("secret does not exist at provider using .dataFrom[%d]", i))
  470. continue
  471. }
  472. if err != nil {
  473. return nil, err
  474. }
  475. secretMap, err = utils.ConvertKeys(remoteRef.Find.ConversionStrategy, secretMap)
  476. if err != nil {
  477. return nil, fmt.Errorf(errConvert, err)
  478. }
  479. } else if remoteRef.Extract != nil {
  480. secretMap, err = providerClient.GetSecretMap(ctx, *remoteRef.Extract)
  481. if errors.Is(err, esv1beta1.NoSecretErr) && externalSecret.Spec.Target.DeletionPolicy != esv1beta1.DeletionPolicyRetain {
  482. r.recorder.Event(externalSecret, v1.EventTypeNormal, esv1beta1.ReasonDeleted, fmt.Sprintf("secret does not exist at provider using .dataFrom[%d]", i))
  483. continue
  484. }
  485. if err != nil {
  486. return nil, err
  487. }
  488. secretMap, err = utils.ConvertKeys(remoteRef.Extract.ConversionStrategy, secretMap)
  489. if err != nil {
  490. return nil, fmt.Errorf(errConvert, err)
  491. }
  492. }
  493. providerData = utils.MergeByteMap(providerData, secretMap)
  494. }
  495. for i, secretRef := range externalSecret.Spec.Data {
  496. secretData, err := providerClient.GetSecret(ctx, secretRef.RemoteRef)
  497. if errors.Is(err, esv1beta1.NoSecretErr) && externalSecret.Spec.Target.DeletionPolicy != esv1beta1.DeletionPolicyRetain {
  498. r.recorder.Event(externalSecret, v1.EventTypeNormal, esv1beta1.ReasonDeleted, fmt.Sprintf("secret does not exist at provider using .data[%d] key=%s", i, secretRef.RemoteRef.Key))
  499. continue
  500. }
  501. if err != nil {
  502. return nil, err
  503. }
  504. providerData[secretRef.SecretKey] = secretData
  505. }
  506. return providerData, nil
  507. }
  508. // SetupWithManager returns a new controller builder that will be started by the provided Manager.
  509. func (r *Reconciler) SetupWithManager(mgr ctrl.Manager, opts controller.Options) error {
  510. r.recorder = mgr.GetEventRecorderFor("external-secrets")
  511. return ctrl.NewControllerManagedBy(mgr).
  512. WithOptions(opts).
  513. For(&esv1beta1.ExternalSecret{}).
  514. Owns(&v1.Secret{}, builder.OnlyMetadata).
  515. Complete(r)
  516. }