Skip to content

Commit

Permalink
Merge pull request GoogleCloudPlatform#3192 from yuwenma/faster-scifi
Browse files Browse the repository at this point in the history
feat: add API for SecretManagerSecretVersion
  • Loading branch information
google-oss-prow[bot] authored Nov 19, 2024
2 parents 9eeeae7 + 0f92ba3 commit 064601c
Show file tree
Hide file tree
Showing 16 changed files with 1,220 additions and 238 deletions.
1 change: 1 addition & 0 deletions apis/refs/v1beta1/secret/basicauth.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ import (

var _ SecretRef = &BasicAuthSecretRef{}

// +kubebuilder:object:generate:=true
type BasicAuthSecretRef struct {
// +required
// The `metadata.name` field of a Kubernetes `Secret`
Expand Down
37 changes: 37 additions & 0 deletions apis/refs/v1beta1/secret/legacy.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
// Copyright 2024 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package secret

import (
"github.com/GoogleCloudPlatform/k8s-config-connector/pkg/clients/generated/apis/k8s/v1alpha1"
)

// +kubebuilder:object:generate:=true
type Legacy struct {
/* Value of the field. Cannot be used if 'valueFrom' is specified. */
// +optional
Value *string `json:"value,omitempty"`

/* Source for the field's value. Cannot be used if 'value' is specified. */
// +optional
ValueFrom *LegacyValueFrom `json:"valueFrom,omitempty"`
}

// +kubebuilder:object:generate:=true
type LegacyValueFrom struct {
/* Reference to a value with the given key in the given Secret in the resource's namespace. */
// +optional
SecretKeyRef *v1alpha1.SecretKeyRef `json:"secretKeyRef,omitempty"`
}
83 changes: 83 additions & 0 deletions apis/refs/v1beta1/secret/zz_generated.deepcopy.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

99 changes: 99 additions & 0 deletions apis/secretmanager/v1beta1/secretversion_reference.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,99 @@
// Copyright 2024 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package v1beta1

import (
"context"
"fmt"
"strings"

refsv1beta1 "github.com/GoogleCloudPlatform/k8s-config-connector/apis/refs/v1beta1"
"github.com/GoogleCloudPlatform/k8s-config-connector/pkg/k8s"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/client"
)

var _ refsv1beta1.ExternalNormalizer = &SecretVersionRef{}

// SecretVersionRef defines the resource reference to SecretManagerSecretVersion, which "External" field
// holds the GCP identifier for the KRM object.
type SecretVersionRef struct {
// A reference to an externally managed SecretManagerSecretVersion resource.
// Should be in the format "projects/<projectID>/locations/<location>/secretversions/<secretversionID>".
External string `json:"external,omitempty"`

// The name of a SecretManagerSecretVersion resource.
Name string `json:"name,omitempty"`

// The namespace of a SecretManagerSecretVersion resource.
Namespace string `json:"namespace,omitempty"`
}

// NormalizedExternal provision the "External" value for other resource that depends on SecretManagerSecretVersion.
// If the "External" is given in the other resource's spec.SecretVersionRef, the given value will be used.
// Otherwise, the "Name" and "Namespace" will be used to query the actual SecretManagerSecretVersion object from the cluster.
func (r *SecretVersionRef) NormalizedExternal(ctx context.Context, reader client.Reader, otherNamespace string) (string, error) {
if r.External != "" && r.Name != "" {
return "", fmt.Errorf("cannot specify both name and external on %s reference", SecretManagerSecretVersionGVK.Kind)
}
// From given External
if r.External != "" {
if _, err := ParseSecretVersionExternal(r.External); err != nil {
return "", err
}
return r.External, nil
}

// From the Config Connector object
if r.Namespace == "" {
r.Namespace = otherNamespace
}
key := types.NamespacedName{Name: r.Name, Namespace: r.Namespace}
u := &unstructured.Unstructured{}
u.SetGroupVersionKind(SecretManagerSecretVersionGVK)
if err := reader.Get(ctx, key, u); err != nil {
if apierrors.IsNotFound(err) {
return "", k8s.NewReferenceNotFoundError(u.GroupVersionKind(), key)
}
return "", fmt.Errorf("reading referenced %s %s: %w", SecretManagerSecretVersionGVK, key, err)
}
// Get external from status.externalRef. This is the most trustworthy place.
actualExternalRef, _, err := unstructured.NestedString(u.Object, "status", "externalRef")
if err != nil {
return "", fmt.Errorf("reading status.externalRef: %w", err)
}
if actualExternalRef == "" {
return "", k8s.NewReferenceNotReadyError(u.GroupVersionKind(), key)
}
r.External = actualExternalRef
return r.External, nil
}

func ParseSecretVersionExternal(external string) (*SecretIdentity, error) {
if external == "" {
return nil, fmt.Errorf("missing external value")
}
external = strings.TrimPrefix(external, "/")
tokens := strings.Split(external, "/")
if len(tokens) != 6 || tokens[0] != "projects" || tokens[2] != "secrets" || tokens[4] != "versions" {
return nil, fmt.Errorf("format of SecretManagerSecretVersion external=%q was not known (use projects/<projectId>/secrets/<secretID>/versions/<versionID>)", external)
}
return &SecretIdentity{
parent: &SecretParent{ProjectID: tokens[1]},
id: tokens[3],
}, nil
}
Loading

0 comments on commit 064601c

Please sign in to comment.