externalsecret_controller_template.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. /*
  2. Licensed under the Apache License, Version 2.0 (the "License");
  3. you may not use this file except in compliance with the License.
  4. You may obtain a copy of the License at
  5. http://www.apache.org/licenses/LICENSE-2.0
  6. Unless required by applicable law or agreed to in writing, software
  7. distributed under the License is distributed on an "AS IS" BASIS,
  8. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  9. See the License for the specific language governing permissions and
  10. limitations under the License.
  11. */
  12. package externalsecret
  13. import (
  14. "context"
  15. "fmt"
  16. "maps"
  17. v1 "k8s.io/api/core/v1"
  18. "sigs.k8s.io/controller-runtime/pkg/controller/controllerutil"
  19. esv1 "github.com/external-secrets/external-secrets/apis/externalsecrets/v1"
  20. "github.com/external-secrets/external-secrets/pkg/controllers/templating"
  21. "github.com/external-secrets/external-secrets/pkg/template"
  22. "github.com/external-secrets/external-secrets/pkg/utils"
  23. _ "github.com/external-secrets/external-secrets/pkg/provider/register" // Loading registered providers.
  24. )
  25. // merge template in the following order:
  26. // * template.Data (highest precedence)
  27. // * template.TemplateFrom
  28. // * secret via es.data or es.dataFrom (if template.MergePolicy is Merge, or there is no template)
  29. // * existing secret keys (if CreationPolicy is Merge).
  30. func (r *Reconciler) ApplyTemplate(ctx context.Context, es *esv1.ExternalSecret, secret *v1.Secret, dataMap map[string][]byte) error {
  31. // update metadata (labels, annotations, finalizers) of the secret
  32. if err := setMetadata(secret, es); err != nil {
  33. return err
  34. }
  35. // we only keep existing keys if creation policy is Merge, otherwise we clear the secret
  36. if es.Spec.Target.CreationPolicy != esv1.CreatePolicyMerge {
  37. secret.Data = make(map[string][]byte)
  38. }
  39. // no template: copy data and return
  40. if es.Spec.Target.Template == nil {
  41. maps.Insert(secret.Data, maps.All(dataMap))
  42. return nil
  43. }
  44. // set the secret type if it is defined in the template, otherwise keep the existing type
  45. if es.Spec.Target.Template.Type != "" {
  46. secret.Type = es.Spec.Target.Template.Type
  47. }
  48. // when TemplateMergePolicy is Merge, or there is no data template, we include the keys from `dataMap`
  49. noTemplate := len(es.Spec.Target.Template.Data) == 0 && len(es.Spec.Target.Template.TemplateFrom) == 0
  50. if es.Spec.Target.Template.MergePolicy == esv1.MergePolicyMerge || noTemplate {
  51. maps.Insert(secret.Data, maps.All(dataMap))
  52. }
  53. execute, err := template.EngineForVersion(es.Spec.Target.Template.EngineVersion)
  54. if err != nil {
  55. return err
  56. }
  57. p := templating.Parser{
  58. Client: r.Client,
  59. TargetSecret: secret,
  60. DataMap: dataMap,
  61. Exec: execute,
  62. }
  63. // apply templates defined in template.templateFrom
  64. err = p.MergeTemplateFrom(ctx, es.Namespace, es.Spec.Target.Template)
  65. if err != nil {
  66. return fmt.Errorf(errFetchTplFrom, err)
  67. }
  68. // apply data templates
  69. // NOTE: explicitly defined template.data templates take precedence over templateFrom
  70. err = p.MergeMap(es.Spec.Target.Template.Data, esv1.TemplateTargetData)
  71. if err != nil {
  72. return fmt.Errorf(errExecTpl, err)
  73. }
  74. // apply templates for labels
  75. // NOTE: this only works for v2 templates
  76. err = p.MergeMap(es.Spec.Target.Template.Metadata.Labels, esv1.TemplateTargetLabels)
  77. if err != nil {
  78. return fmt.Errorf(errExecTpl, err)
  79. }
  80. // apply template for annotations
  81. // NOTE: this only works for v2 templates
  82. err = p.MergeMap(es.Spec.Target.Template.Metadata.Annotations, esv1.TemplateTargetAnnotations)
  83. if err != nil {
  84. return fmt.Errorf(errExecTpl, err)
  85. }
  86. return nil
  87. }
  88. // setMetadata sets Labels and Annotations to the given secret.
  89. func setMetadata(secret *v1.Secret, es *esv1.ExternalSecret) error {
  90. // ensure that Labels and Annotations are not nil
  91. // so it is safe to merge them
  92. if secret.Labels == nil {
  93. secret.Labels = make(map[string]string)
  94. }
  95. if secret.Annotations == nil {
  96. secret.Annotations = make(map[string]string)
  97. }
  98. // remove any existing labels managed by this external secret
  99. // this is to ensure that we don't have any stale labels
  100. labelKeys, err := templating.GetManagedLabelKeys(secret, es.Name)
  101. if err != nil {
  102. return err
  103. }
  104. for _, key := range labelKeys {
  105. delete(secret.ObjectMeta.Labels, key)
  106. }
  107. annotationKeys, err := templating.GetManagedAnnotationKeys(secret, es.Name)
  108. if err != nil {
  109. return err
  110. }
  111. for _, key := range annotationKeys {
  112. delete(secret.ObjectMeta.Annotations, key)
  113. }
  114. // if no template is defined, copy labels and annotations from the ExternalSecret
  115. if es.Spec.Target.Template == nil {
  116. utils.MergeStringMap(secret.ObjectMeta.Labels, es.ObjectMeta.Labels)
  117. utils.MergeStringMap(secret.ObjectMeta.Annotations, es.ObjectMeta.Annotations)
  118. return nil
  119. }
  120. // copy labels and annotations from the template
  121. utils.MergeStringMap(secret.ObjectMeta.Labels, es.Spec.Target.Template.Metadata.Labels)
  122. utils.MergeStringMap(secret.ObjectMeta.Annotations, es.Spec.Target.Template.Metadata.Annotations)
  123. // add finalizers from the template
  124. if secret.ObjectMeta.DeletionTimestamp.IsZero() {
  125. for _, finalizer := range es.Spec.Target.Template.Metadata.Finalizers {
  126. if !controllerutil.ContainsFinalizer(secret, finalizer) {
  127. controllerutil.AddFinalizer(secret, finalizer)
  128. }
  129. }
  130. }
  131. return nil
  132. }