externalsecret_controller.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package externalsecret
  13. import (
  14. "context"
  15. // nolint
  16. "crypto/md5"
  17. "fmt"
  18. "time"
  19. "github.com/go-logr/logr"
  20. "github.com/prometheus/client_golang/prometheus"
  21. v1 "k8s.io/api/core/v1"
  22. apierrors "k8s.io/apimachinery/pkg/api/errors"
  23. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  24. "k8s.io/apimachinery/pkg/runtime"
  25. "k8s.io/apimachinery/pkg/types"
  26. ctrl "sigs.k8s.io/controller-runtime"
  27. "sigs.k8s.io/controller-runtime/pkg/client"
  28. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  29. esv1alpha1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1"
  30. "github.com/external-secrets/external-secrets/pkg/provider"
  31. // Loading registered providers.
  32. _ "github.com/external-secrets/external-secrets/pkg/provider/register"
  33. schema "github.com/external-secrets/external-secrets/pkg/provider/schema"
  34. "github.com/external-secrets/external-secrets/pkg/template"
  35. utils "github.com/external-secrets/external-secrets/pkg/utils"
  36. )
  37. const (
  38. requeueAfter = time.Second * 30
  39. errGetES = "could not get ExternalSecret"
  40. errReconcileES = "could not reconcile ExternalSecret"
  41. errPatchStatus = "unable to patch status"
  42. errGetSecretStore = "could not get SecretStore %q, %w"
  43. errGetClusterSecretStore = "could not get ClusterSecretStore %q, %w"
  44. errStoreRef = "could not get store reference"
  45. errStoreProvider = "could not get store provider"
  46. errStoreClient = "could not get provider client"
  47. errCloseStoreClient = "could not close provider client"
  48. errSetCtrlReference = "could not set ExternalSecret controller reference: %w"
  49. errFetchTplFrom = "error fetching templateFrom data: %w"
  50. errGetSecretData = "could not get secret data from provider: %w"
  51. errExecTpl = "could not execute template: %w"
  52. errPolicyMergeNotFound = "the desired secret %s was not found. With creationPolicy=Merge the secret won't be created"
  53. errPolicyMergeGetSecret = "unable to get secret %s: %w"
  54. errPolicyMergeMutate = "unable to mutate secret %s: %w"
  55. errPolicyMergePatch = "unable to patch secret %s: %w"
  56. errGetSecretKey = "key %q from ExternalSecret %q: %w"
  57. errTplCMMissingKey = "error in configmap %s: missing key %s"
  58. errTplSecMissingKey = "error in secret %s: missing key %s"
  59. )
  60. // Reconciler reconciles a ExternalSecret object.
  61. type Reconciler struct {
  62. client.Client
  63. Log logr.Logger
  64. Scheme *runtime.Scheme
  65. ControllerClass string
  66. RequeueInterval time.Duration
  67. }
  68. // Reconcile implements the main reconciliation loop
  69. // for watched objects (ExternalSecret, ClusterSecretStore and SecretStore),
  70. // and updates/creates a Kubernetes secret based on them.
  71. func (r *Reconciler) Reconcile(ctx context.Context, req ctrl.Request) (ctrl.Result, error) {
  72. log := r.Log.WithValues("ExternalSecret", req.NamespacedName)
  73. syncCallsMetricLabels := prometheus.Labels{"name": req.Name, "namespace": req.Namespace}
  74. var externalSecret esv1alpha1.ExternalSecret
  75. err := r.Get(ctx, req.NamespacedName, &externalSecret)
  76. if apierrors.IsNotFound(err) {
  77. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  78. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretDeleted, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretDeleted, "Secret was deleted")
  79. SetExternalSecretCondition(&esv1alpha1.ExternalSecret{
  80. ObjectMeta: metav1.ObjectMeta{
  81. Name: req.Name,
  82. Namespace: req.Namespace,
  83. },
  84. }, *conditionSynced)
  85. return ctrl.Result{}, nil
  86. } else if err != nil {
  87. log.Error(err, errGetES)
  88. syncCallsError.With(syncCallsMetricLabels).Inc()
  89. return ctrl.Result{}, nil
  90. }
  91. // patch status when done processing
  92. p := client.MergeFrom(externalSecret.DeepCopy())
  93. defer func() {
  94. err = r.Status().Patch(ctx, &externalSecret, p)
  95. if err != nil {
  96. log.Error(err, errPatchStatus)
  97. }
  98. }()
  99. store, err := r.getStore(ctx, &externalSecret)
  100. if err != nil {
  101. log.Error(err, errStoreRef)
  102. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  103. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  104. syncCallsError.With(syncCallsMetricLabels).Inc()
  105. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  106. }
  107. log = log.WithValues("SecretStore", store.GetNamespacedName())
  108. // check if store should be handled by this controller instance
  109. if !shouldProcessStore(store, r.ControllerClass) {
  110. log.Info("skippig unmanaged store")
  111. return ctrl.Result{}, nil
  112. }
  113. storeProvider, err := schema.GetProvider(store)
  114. if err != nil {
  115. log.Error(err, errStoreProvider)
  116. syncCallsError.With(syncCallsMetricLabels).Inc()
  117. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  118. }
  119. secretClient, err := storeProvider.NewClient(ctx, store, r.Client, req.Namespace)
  120. if err != nil {
  121. log.Error(err, errStoreClient)
  122. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  123. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  124. syncCallsError.With(syncCallsMetricLabels).Inc()
  125. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  126. }
  127. defer func() {
  128. err = secretClient.Close()
  129. if err != nil {
  130. log.Error(err, errCloseStoreClient)
  131. }
  132. }()
  133. refreshInt := r.RequeueInterval
  134. if externalSecret.Spec.RefreshInterval != nil {
  135. refreshInt = externalSecret.Spec.RefreshInterval.Duration
  136. }
  137. // refresh should be skipped if
  138. // 1. resource generation hasn't changed
  139. // 2. refresh interval is 0
  140. // 3. if we're still within refresh-interval
  141. if !shouldRefresh(externalSecret) {
  142. log.V(1).Info("skipping refresh", "rv", getResourceVersion(externalSecret))
  143. return ctrl.Result{RequeueAfter: refreshInt}, nil
  144. }
  145. // Target Secret Name should default to the ExternalSecret name if not explicitly specified
  146. secretName := externalSecret.Spec.Target.Name
  147. if secretName == "" {
  148. secretName = externalSecret.ObjectMeta.Name
  149. }
  150. secret := &v1.Secret{
  151. ObjectMeta: metav1.ObjectMeta{
  152. Name: secretName,
  153. Namespace: externalSecret.Namespace,
  154. },
  155. Data: make(map[string][]byte),
  156. }
  157. mutationFunc := func() error {
  158. if externalSecret.Spec.Target.CreationPolicy == esv1alpha1.Owner {
  159. err = controllerutil.SetControllerReference(&externalSecret, &secret.ObjectMeta, r.Scheme)
  160. if err != nil {
  161. return fmt.Errorf(errSetCtrlReference, err)
  162. }
  163. }
  164. mergeMetadata(secret, externalSecret)
  165. var tplMap map[string][]byte
  166. var dataMap map[string][]byte
  167. // get data
  168. dataMap, err = r.getProviderSecretData(ctx, secretClient, &externalSecret)
  169. if err != nil {
  170. return fmt.Errorf(errGetSecretData, err)
  171. }
  172. // no template: copy data and return
  173. if externalSecret.Spec.Target.Template == nil {
  174. secret.Data = dataMap
  175. return nil
  176. }
  177. // template: fetch & execute templates
  178. tplMap, err = r.getTemplateData(ctx, &externalSecret)
  179. if err != nil {
  180. return fmt.Errorf(errFetchTplFrom, err)
  181. }
  182. // override templateFrom data with template data
  183. for k, v := range externalSecret.Spec.Target.Template.Data {
  184. tplMap[k] = []byte(v)
  185. }
  186. log.V(1).Info("found template data", "tpl_data", tplMap)
  187. err = template.Execute(tplMap, dataMap, secret)
  188. if err != nil {
  189. return fmt.Errorf(errExecTpl, err)
  190. }
  191. return nil
  192. }
  193. //nolint
  194. switch externalSecret.Spec.Target.CreationPolicy {
  195. case esv1alpha1.Merge:
  196. err = patchSecret(ctx, r.Client, r.Scheme, secret, mutationFunc)
  197. case esv1alpha1.None:
  198. log.V(1).Info("secret creation skipped due to creationPolicy=None")
  199. err = nil
  200. default:
  201. _, err = ctrl.CreateOrUpdate(ctx, r.Client, secret, mutationFunc)
  202. }
  203. if err != nil {
  204. log.Error(err, errReconcileES)
  205. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionFalse, esv1alpha1.ConditionReasonSecretSyncedError, err.Error())
  206. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  207. syncCallsError.With(syncCallsMetricLabels).Inc()
  208. return ctrl.Result{RequeueAfter: requeueAfter}, nil
  209. }
  210. conditionSynced := NewExternalSecretCondition(esv1alpha1.ExternalSecretReady, v1.ConditionTrue, esv1alpha1.ConditionReasonSecretSynced, "Secret was synced")
  211. SetExternalSecretCondition(&externalSecret, *conditionSynced)
  212. externalSecret.Status.RefreshTime = metav1.NewTime(time.Now())
  213. externalSecret.Status.SyncedResourceVersion = getResourceVersion(externalSecret)
  214. syncCallsTotal.With(syncCallsMetricLabels).Inc()
  215. log.V(1).Info("reconciled secret")
  216. return ctrl.Result{
  217. RequeueAfter: refreshInt,
  218. }, nil
  219. }
  220. func patchSecret(ctx context.Context, c client.Client, scheme *runtime.Scheme, secret *v1.Secret, mutationFunc func() error) error {
  221. err := c.Get(ctx, client.ObjectKeyFromObject(secret), secret.DeepCopy())
  222. if apierrors.IsNotFound(err) {
  223. return fmt.Errorf(errPolicyMergeNotFound, secret.Name)
  224. }
  225. if err != nil {
  226. return fmt.Errorf(errPolicyMergeGetSecret, secret.Name, err)
  227. }
  228. err = mutationFunc()
  229. if err != nil {
  230. return fmt.Errorf(errPolicyMergeMutate, secret.Name, err)
  231. }
  232. // GVK is missing in the Secret, see:
  233. // https://github.com/kubernetes-sigs/controller-runtime/issues/526
  234. // https://github.com/kubernetes-sigs/controller-runtime/issues/1517
  235. // https://github.com/kubernetes/kubernetes/issues/80609
  236. // we need to manually set it befor doing a Patch() as it depends on the GVK
  237. gvks, unversioned, err := scheme.ObjectKinds(secret)
  238. if err != nil {
  239. return err
  240. }
  241. if !unversioned && len(gvks) == 1 {
  242. secret.SetGroupVersionKind(gvks[0])
  243. }
  244. // we might get into a conflict here if we are not the manager of that particular field
  245. // we do not resolve the conflict and return an error instead
  246. // see: https://kubernetes.io/docs/reference/using-api/server-side-apply/#conflicts
  247. err = c.Patch(ctx, secret, client.Apply, client.FieldOwner("external-secrets"))
  248. if err != nil {
  249. return fmt.Errorf(errPolicyMergePatch, secret.Name, err)
  250. }
  251. return nil
  252. }
  253. // shouldProcessStore returns true if the store should be processed.
  254. func shouldProcessStore(store esv1alpha1.GenericStore, class string) bool {
  255. if store.GetSpec().Controller == "" || store.GetSpec().Controller == class {
  256. return true
  257. }
  258. return false
  259. }
  260. func getResourceVersion(es esv1alpha1.ExternalSecret) string {
  261. return fmt.Sprintf("%d-%s", es.ObjectMeta.GetGeneration(), hashMeta(es.ObjectMeta))
  262. }
  263. func hashMeta(m metav1.ObjectMeta) string {
  264. type meta struct {
  265. annotations map[string]string
  266. labels map[string]string
  267. }
  268. h := md5.New() //nolint
  269. _, _ = h.Write([]byte(fmt.Sprintf("%v", meta{
  270. annotations: m.Annotations,
  271. labels: m.Labels,
  272. })))
  273. return fmt.Sprintf("%x", h.Sum(nil))
  274. }
  275. func shouldRefresh(es esv1alpha1.ExternalSecret) bool {
  276. // refresh if resource version changed
  277. if es.Status.SyncedResourceVersion != getResourceVersion(es) {
  278. return true
  279. }
  280. // skip refresh if refresh interval is 0
  281. if es.Spec.RefreshInterval.Duration == 0 && es.Status.SyncedResourceVersion != "" {
  282. return false
  283. }
  284. if es.Status.RefreshTime.IsZero() {
  285. return true
  286. }
  287. return !es.Status.RefreshTime.Add(es.Spec.RefreshInterval.Duration).After(time.Now())
  288. }
  289. // we do not want to force-override the label/annotations
  290. // and only copy the necessary key/value pairs.
  291. func mergeMetadata(secret *v1.Secret, externalSecret esv1alpha1.ExternalSecret) {
  292. if secret.ObjectMeta.Labels == nil {
  293. secret.ObjectMeta.Labels = make(map[string]string)
  294. }
  295. if secret.ObjectMeta.Annotations == nil {
  296. secret.ObjectMeta.Annotations = make(map[string]string)
  297. }
  298. if externalSecret.Spec.Target.Template == nil {
  299. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.ObjectMeta.Labels)
  300. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.ObjectMeta.Annotations)
  301. return
  302. }
  303. // if template is defined: use those labels/annotations
  304. secret.Type = externalSecret.Spec.Target.Template.Type
  305. utils.MergeStringMap(secret.ObjectMeta.Labels, externalSecret.Spec.Target.Template.Metadata.Labels)
  306. utils.MergeStringMap(secret.ObjectMeta.Annotations, externalSecret.Spec.Target.Template.Metadata.Annotations)
  307. }
  308. // getStore returns the store with the provided ExternalSecret.
  309. func (r *Reconciler) getStore(ctx context.Context, externalSecret *esv1alpha1.ExternalSecret) (esv1alpha1.GenericStore, error) {
  310. ref := types.NamespacedName{
  311. Name: externalSecret.Spec.SecretStoreRef.Name,
  312. }
  313. if externalSecret.Spec.SecretStoreRef.Kind == esv1alpha1.ClusterSecretStoreKind {
  314. var store esv1alpha1.ClusterSecretStore
  315. err := r.Get(ctx, ref, &store)
  316. if err != nil {
  317. return nil, fmt.Errorf(errGetClusterSecretStore, ref.Name, err)
  318. }
  319. return &store, nil
  320. }
  321. ref.Namespace = externalSecret.Namespace
  322. var store esv1alpha1.SecretStore
  323. err := r.Get(ctx, ref, &store)
  324. if err != nil {
  325. return nil, fmt.Errorf(errGetSecretStore, ref.Name, err)
  326. }
  327. return &store, nil
  328. }
  329. // getProviderSecretData returns the provider's secret data with the provided ExternalSecret.
  330. func (r *Reconciler) getProviderSecretData(ctx context.Context, providerClient provider.SecretsClient, externalSecret *esv1alpha1.ExternalSecret) (map[string][]byte, error) {
  331. providerData := make(map[string][]byte)
  332. for _, remoteRef := range externalSecret.Spec.DataFrom {
  333. secretMap, err := providerClient.GetSecretMap(ctx, remoteRef)
  334. if err != nil {
  335. return nil, fmt.Errorf(errGetSecretKey, remoteRef.Key, externalSecret.Name, err)
  336. }
  337. providerData = utils.MergeByteMap(providerData, secretMap)
  338. }
  339. for _, secretRef := range externalSecret.Spec.Data {
  340. secretData, err := providerClient.GetSecret(ctx, secretRef.RemoteRef)
  341. if err != nil {
  342. return nil, fmt.Errorf(errGetSecretKey, secretRef.RemoteRef.Key, externalSecret.Name, err)
  343. }
  344. providerData[secretRef.SecretKey] = secretData
  345. }
  346. return providerData, nil
  347. }
  348. func (r *Reconciler) getTemplateData(ctx context.Context, externalSecret *esv1alpha1.ExternalSecret) (map[string][]byte, error) {
  349. out := make(map[string][]byte)
  350. if externalSecret.Spec.Target.Template == nil {
  351. return out, nil
  352. }
  353. for _, tpl := range externalSecret.Spec.Target.Template.TemplateFrom {
  354. if tpl.ConfigMap != nil {
  355. var cm v1.ConfigMap
  356. err := r.Client.Get(ctx, types.NamespacedName{
  357. Name: tpl.ConfigMap.Name,
  358. Namespace: externalSecret.Namespace,
  359. }, &cm)
  360. if err != nil {
  361. return nil, err
  362. }
  363. for _, k := range tpl.ConfigMap.Items {
  364. val, ok := cm.Data[k.Key]
  365. if !ok {
  366. return nil, fmt.Errorf(errTplCMMissingKey, tpl.ConfigMap.Name, k.Key)
  367. }
  368. out[k.Key] = []byte(val)
  369. }
  370. }
  371. if tpl.Secret != nil {
  372. var sec v1.Secret
  373. err := r.Client.Get(ctx, types.NamespacedName{
  374. Name: tpl.Secret.Name,
  375. Namespace: externalSecret.Namespace,
  376. }, &sec)
  377. if err != nil {
  378. return nil, err
  379. }
  380. for _, k := range tpl.Secret.Items {
  381. val, ok := sec.Data[k.Key]
  382. if !ok {
  383. return nil, fmt.Errorf(errTplSecMissingKey, tpl.Secret.Name, k.Key)
  384. }
  385. out[k.Key] = val
  386. }
  387. }
  388. }
  389. return out, nil
  390. }
  391. // SetupWithManager returns a new controller builder that will be started by the provided Manager.
  392. func (r *Reconciler) SetupWithManager(mgr ctrl.Manager) error {
  393. return ctrl.NewControllerManagedBy(mgr).
  394. For(&esv1alpha1.ExternalSecret{}).
  395. Owns(&v1.Secret{}).
  396. Complete(r)
  397. }