clusterexternalsecret_controller.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package clusterexternalsecret
  13. import (
  14. "context"
  15. "fmt"
  16. "reflect"
  17. "slices"
  18. "sort"
  19. "time"
  20. "github.com/go-logr/logr"
  21. v1 "k8s.io/api/core/v1"
  22. apierrors "k8s.io/apimachinery/pkg/api/errors"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/apimachinery/pkg/labels"
  25. "k8s.io/apimachinery/pkg/runtime"
  26. "k8s.io/apimachinery/pkg/types"
  27. ctrl "sigs.k8s.io/controller-runtime"
  28. "sigs.k8s.io/controller-runtime/pkg/builder"
  29. "sigs.k8s.io/controller-runtime/pkg/client"
  30. "sigs.k8s.io/controller-runtime/pkg/controller"
  31. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  32. "sigs.k8s.io/controller-runtime/pkg/event"
  33. "sigs.k8s.io/controller-runtime/pkg/handler"
  34. "sigs.k8s.io/controller-runtime/pkg/predicate"
  35. "sigs.k8s.io/controller-runtime/pkg/reconcile"
  36. esv1beta1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1"
  37. "github.com/external-secrets/external-secrets/pkg/controllers/clusterexternalsecret/cesmetrics"
  38. ctrlmetrics "github.com/external-secrets/external-secrets/pkg/controllers/metrics"
  39. )
  40. // ClusterExternalSecretReconciler reconciles a ClusterExternalSecret object.
  41. type Reconciler struct {
  42. client.Client
  43. Log logr.Logger
  44. Scheme *runtime.Scheme
  45. RequeueInterval time.Duration
  46. }
  47. const (
  48. errGetCES = "could not get ClusterExternalSecret"
  49. errPatchStatus = "unable to patch status"
  50. errConvertLabelSelector = "unable to convert labelselector"
  51. errNamespaces = "could not get namespaces from selector"
  52. errGetExistingES = "could not get existing ExternalSecret"
  53. errNamespacesFailed = "one or more namespaces failed"
  54. )
  55. func (r *Reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
  56. log := r.Log.WithValues("ClusterExternalSecret", req.NamespacedName)
  57. resourceLabels := ctrlmetrics.RefineNonConditionMetricLabels(map[string]string{"name": req.Name, "namespace": req.Namespace})
  58. start := time.Now()
  59. externalSecretReconcileDuration := cesmetrics.GetGaugeVec(cesmetrics.ClusterExternalSecretReconcileDurationKey)
  60. defer func() { externalSecretReconcileDuration.With(resourceLabels).Set(float64(time.Since(start))) }()
  61. var clusterExternalSecret esv1beta1.ClusterExternalSecret
  62. err := r.Get(ctx, req.NamespacedName, &clusterExternalSecret)
  63. if err != nil {
  64. if apierrors.IsNotFound(err) {
  65. cesmetrics.RemoveMetrics(req.Namespace, req.Name)
  66. return ctrl.Result{}, nil
  67. }
  68. log.Error(err, errGetCES)
  69. return ctrl.Result{}, err
  70. }
  71. // skip reconciliation if deletion timestamp is set on cluster external secret
  72. if clusterExternalSecret.DeletionTimestamp != nil {
  73. log.Info("skipping as it is in deletion")
  74. return ctrl.Result{}, nil
  75. }
  76. p := client.MergeFrom(clusterExternalSecret.DeepCopy())
  77. defer r.deferPatch(ctx, log, &clusterExternalSecret, p)
  78. refreshInt := r.RequeueInterval
  79. if clusterExternalSecret.Spec.RefreshInterval != nil {
  80. refreshInt = clusterExternalSecret.Spec.RefreshInterval.Duration
  81. }
  82. namespaceList := v1.NamespaceList{}
  83. if clusterExternalSecret.Spec.NamespaceSelector != nil {
  84. labelSelector, err := metav1.LabelSelectorAsSelector(clusterExternalSecret.Spec.NamespaceSelector)
  85. if err != nil {
  86. log.Error(err, errConvertLabelSelector)
  87. return ctrl.Result{}, err
  88. }
  89. err = r.List(ctx, &namespaceList, &client.ListOptions{LabelSelector: labelSelector})
  90. if err != nil {
  91. log.Error(err, errNamespaces)
  92. return ctrl.Result{}, err
  93. }
  94. }
  95. if len(clusterExternalSecret.Spec.Namespaces) > 0 {
  96. var additionalNamespace []v1.Namespace
  97. for _, ns := range clusterExternalSecret.Spec.Namespaces {
  98. namespace := &v1.Namespace{}
  99. if err = r.Get(ctx, types.NamespacedName{Name: ns}, namespace); err != nil {
  100. if apierrors.IsNotFound(err) {
  101. continue
  102. }
  103. log.Error(err, errNamespaces)
  104. return ctrl.Result{}, err
  105. }
  106. additionalNamespace = append(additionalNamespace, *namespace)
  107. }
  108. namespaceList.Items = append(namespaceList.Items, additionalNamespace...)
  109. }
  110. esName := clusterExternalSecret.Spec.ExternalSecretName
  111. if esName == "" {
  112. esName = clusterExternalSecret.ObjectMeta.Name
  113. }
  114. if prevName := clusterExternalSecret.Status.ExternalSecretName; prevName != esName {
  115. // ExternalSecretName has changed, so remove the old ones
  116. for _, ns := range clusterExternalSecret.Status.ProvisionedNamespaces {
  117. if err := r.deleteExternalSecret(ctx, prevName, clusterExternalSecret.Name, ns); err != nil {
  118. log.Error(err, "could not delete ExternalSecret")
  119. return ctrl.Result{}, err
  120. }
  121. }
  122. }
  123. clusterExternalSecret.Status.ExternalSecretName = esName
  124. failedNamespaces := r.deleteOutdatedExternalSecrets(ctx, namespaceList, esName, clusterExternalSecret.Name, clusterExternalSecret.Status.ProvisionedNamespaces)
  125. provisionedNamespaces := []string{}
  126. for _, namespace := range namespaceList.Items {
  127. var existingES esv1beta1.ExternalSecret
  128. err = r.Get(ctx, types.NamespacedName{
  129. Name: esName,
  130. Namespace: namespace.Name,
  131. }, &existingES)
  132. if err != nil && !apierrors.IsNotFound(err) {
  133. log.Error(err, errGetExistingES)
  134. failedNamespaces[namespace.Name] = err
  135. continue
  136. }
  137. if err == nil && !isExternalSecretOwnedBy(&existingES, clusterExternalSecret.Name) {
  138. failedNamespaces[namespace.Name] = fmt.Errorf("external secret already exists in namespace")
  139. continue
  140. }
  141. if err := r.createOrUpdateExternalSecret(ctx, &clusterExternalSecret, namespace, esName, clusterExternalSecret.Spec.ExternalSecretMetadata); err != nil {
  142. log.Error(err, "failed to create or update external secret")
  143. failedNamespaces[namespace.Name] = err
  144. continue
  145. }
  146. provisionedNamespaces = append(provisionedNamespaces, namespace.Name)
  147. }
  148. condition := NewClusterExternalSecretCondition(failedNamespaces)
  149. SetClusterExternalSecretCondition(&clusterExternalSecret, *condition)
  150. clusterExternalSecret.Status.FailedNamespaces = toNamespaceFailures(failedNamespaces)
  151. sort.Strings(provisionedNamespaces)
  152. clusterExternalSecret.Status.ProvisionedNamespaces = provisionedNamespaces
  153. return ctrl.Result{RequeueAfter: refreshInt}, nil
  154. }
  155. func (r *Reconciler) createOrUpdateExternalSecret(ctx context.Context, clusterExternalSecret *esv1beta1.ClusterExternalSecret, namespace v1.Namespace, esName string, esMetadata esv1beta1.ExternalSecretMetadata) error {
  156. externalSecret := &esv1beta1.ExternalSecret{
  157. ObjectMeta: metav1.ObjectMeta{
  158. Namespace: namespace.Name,
  159. Name: esName,
  160. },
  161. }
  162. mutateFunc := func() error {
  163. externalSecret.Labels = esMetadata.Labels
  164. externalSecret.Annotations = esMetadata.Annotations
  165. externalSecret.Spec = clusterExternalSecret.Spec.ExternalSecretSpec
  166. if err := controllerutil.SetControllerReference(clusterExternalSecret, externalSecret, r.Scheme); err != nil {
  167. return fmt.Errorf("could not set the controller owner reference %w", err)
  168. }
  169. return nil
  170. }
  171. if _, err := ctrl.CreateOrUpdate(ctx, r.Client, externalSecret, mutateFunc); err != nil {
  172. return fmt.Errorf("could not create or update ExternalSecret: %w", err)
  173. }
  174. return nil
  175. }
  176. func (r *Reconciler) deleteExternalSecret(ctx context.Context, esName, cesName, namespace string) error {
  177. var existingES esv1beta1.ExternalSecret
  178. err := r.Get(ctx, types.NamespacedName{
  179. Name: esName,
  180. Namespace: namespace,
  181. }, &existingES)
  182. if err != nil {
  183. // If we can't find it then just leave
  184. if apierrors.IsNotFound(err) {
  185. return nil
  186. }
  187. return err
  188. }
  189. if !isExternalSecretOwnedBy(&existingES, cesName) {
  190. return nil
  191. }
  192. err = r.Delete(ctx, &existingES, &client.DeleteOptions{})
  193. if err != nil {
  194. return fmt.Errorf("external secret in non matching namespace could not be deleted: %w", err)
  195. }
  196. return nil
  197. }
  198. func (r *Reconciler) deferPatch(ctx context.Context, log logr.Logger, clusterExternalSecret *esv1beta1.ClusterExternalSecret, p client.Patch) {
  199. if err := r.Status().Patch(ctx, clusterExternalSecret, p); err != nil {
  200. log.Error(err, errPatchStatus)
  201. }
  202. }
  203. func (r *Reconciler) deleteOutdatedExternalSecrets(ctx context.Context, namespaceList v1.NamespaceList, esName, cesName string, provisionedNamespaces []string) map[string]error {
  204. failedNamespaces := map[string]error{}
  205. // Loop through existing namespaces first to make sure they still have our labels
  206. for _, namespace := range getRemovedNamespaces(namespaceList, provisionedNamespaces) {
  207. err := r.deleteExternalSecret(ctx, esName, cesName, namespace)
  208. if err != nil {
  209. r.Log.Error(err, "unable to delete external secret")
  210. failedNamespaces[namespace] = err
  211. }
  212. }
  213. return failedNamespaces
  214. }
  215. func isExternalSecretOwnedBy(es *esv1beta1.ExternalSecret, cesName string) bool {
  216. owner := metav1.GetControllerOf(es)
  217. return owner != nil && owner.APIVersion == esv1beta1.SchemeGroupVersion.String() && owner.Kind == esv1beta1.ClusterExtSecretKind && owner.Name == cesName
  218. }
  219. func getRemovedNamespaces(currentNSs v1.NamespaceList, provisionedNSs []string) []string {
  220. currentNSSet := map[string]struct{}{}
  221. for i := range currentNSs.Items {
  222. currentNSSet[currentNSs.Items[i].Name] = struct{}{}
  223. }
  224. var removedNSs []string
  225. for _, ns := range provisionedNSs {
  226. if _, ok := currentNSSet[ns]; !ok {
  227. removedNSs = append(removedNSs, ns)
  228. }
  229. }
  230. return removedNSs
  231. }
  232. func toNamespaceFailures(failedNamespaces map[string]error) []esv1beta1.ClusterExternalSecretNamespaceFailure {
  233. namespaceFailures := make([]esv1beta1.ClusterExternalSecretNamespaceFailure, len(failedNamespaces))
  234. i := 0
  235. for namespace, err := range failedNamespaces {
  236. namespaceFailures[i] = esv1beta1.ClusterExternalSecretNamespaceFailure{
  237. Namespace: namespace,
  238. Reason: err.Error(),
  239. }
  240. i++
  241. }
  242. sort.Slice(namespaceFailures, func(i, j int) bool { return namespaceFailures[i].Namespace < namespaceFailures[j].Namespace })
  243. return namespaceFailures
  244. }
  245. // SetupWithManager sets up the controller with the Manager.
  246. func (r *Reconciler) SetupWithManager(mgr ctrl.Manager, opts controller.Options) error {
  247. return ctrl.NewControllerManagedBy(mgr).
  248. WithOptions(opts).
  249. For(&esv1beta1.ClusterExternalSecret{}).
  250. Owns(&esv1beta1.ExternalSecret{}).
  251. Watches(
  252. &v1.Namespace{},
  253. handler.EnqueueRequestsFromMapFunc(r.findObjectsForNamespace),
  254. builder.WithPredicates(namespacePredicate()),
  255. ).
  256. Complete(r)
  257. }
  258. func (r *Reconciler) findObjectsForNamespace(ctx context.Context, namespace client.Object) []reconcile.Request {
  259. var clusterExternalSecrets esv1beta1.ClusterExternalSecretList
  260. if err := r.List(ctx, &clusterExternalSecrets); err != nil {
  261. r.Log.Error(err, errGetCES)
  262. return []reconcile.Request{}
  263. }
  264. var requests []reconcile.Request
  265. for i := range clusterExternalSecrets.Items {
  266. clusterExternalSecret := &clusterExternalSecrets.Items[i]
  267. if clusterExternalSecret.Spec.NamespaceSelector != nil {
  268. labelSelector, err := metav1.LabelSelectorAsSelector(clusterExternalSecret.Spec.NamespaceSelector)
  269. if err != nil {
  270. r.Log.Error(err, errConvertLabelSelector)
  271. return []reconcile.Request{}
  272. }
  273. if labelSelector.Matches(labels.Set(namespace.GetLabels())) {
  274. requests = append(requests, reconcile.Request{
  275. NamespacedName: types.NamespacedName{
  276. Name: clusterExternalSecret.GetName(),
  277. Namespace: clusterExternalSecret.GetNamespace(),
  278. },
  279. })
  280. // Prevent the object from being added twice if it happens to be listed
  281. // by Namespaces selector as well.
  282. continue
  283. }
  284. }
  285. if len(clusterExternalSecret.Spec.Namespaces) > 0 {
  286. if slices.Contains(clusterExternalSecret.Spec.Namespaces, namespace.GetName()) {
  287. requests = append(requests, reconcile.Request{
  288. NamespacedName: types.NamespacedName{
  289. Name: clusterExternalSecret.GetName(),
  290. Namespace: clusterExternalSecret.GetNamespace(),
  291. },
  292. })
  293. }
  294. }
  295. }
  296. return requests
  297. }
  298. func namespacePredicate() predicate.Predicate {
  299. return predicate.Funcs{
  300. CreateFunc: func(e event.CreateEvent) bool {
  301. return true
  302. },
  303. UpdateFunc: func(e event.UpdateEvent) bool {
  304. if e.ObjectOld == nil || e.ObjectNew == nil {
  305. return false
  306. }
  307. return !reflect.DeepEqual(e.ObjectOld.GetLabels(), e.ObjectNew.GetLabels())
  308. },
  309. DeleteFunc: func(deleteEvent event.DeleteEvent) bool {
  310. return true
  311. },
  312. }
  313. }