Skip to content

enable opt-in to redact Secret data from Object status #193

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Feb 9, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ on:

env:
# Common versions
GO_VERSION: '1.20.12'
GO_VERSION: '1.21.7'
GOLANGCI_VERSION: 'v1.55.2'
DOCKER_BUILDX_VERSION: 'v0.8.2'

Expand Down
3 changes: 2 additions & 1 deletion cmd/provider/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,7 @@ func main() {
leaderElection = app.Flag("leader-election", "Use leader election for the controller manager.").Short('l').Default("false").Envar("LEADER_ELECTION").Bool()
maxReconcileRate = app.Flag("max-reconcile-rate", "The number of concurrent reconciliations that may be running at one time.").Default("10").Int()
enableManagementPolicies = app.Flag("enable-management-policies", "Enable support for Management Policies.").Default("true").Envar("ENABLE_MANAGEMENT_POLICIES").Bool()
sanitizeSecrets = app.Flag("sanitize-secrets", "when enabled, redacts Secret data from Object status").Default("false").Envar("SANITIZE_SECRETS").Bool()
)
kingpin.MustParse(app.Parse(os.Args[1:]))

Expand Down Expand Up @@ -129,7 +130,7 @@ func main() {
// notice and remove when we drop support for v1alpha1.
kingpin.FatalIfError(ctrl.NewWebhookManagedBy(mgr).For(&v1alpha1.Object{}).Complete(), "Cannot create Object webhook")

kingpin.FatalIfError(object.Setup(mgr, o), "Cannot setup controller")
kingpin.FatalIfError(object.Setup(mgr, o, *sanitizeSecrets), "Cannot setup controller")
kingpin.FatalIfError(mgr.Start(ctrl.SetupSignalHandler()), "Cannot start controller manager")
}

Expand Down
14 changes: 6 additions & 8 deletions internal/controller/kubernetes.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,14 +27,12 @@ import (

// Setup creates all Template controllers with the supplied logger and adds them to
// the supplied manager.
func Setup(mgr ctrl.Manager, o controller.Options) error {
for _, setup := range []func(ctrl.Manager, controller.Options) error{
config.Setup,
object.Setup,
} {
if err := setup(mgr, o); err != nil {
return err
}
func Setup(mgr ctrl.Manager, o controller.Options, sanitizeSecrets bool) error {
if err := config.Setup(mgr, o); err != nil {
return err
}
if err := object.Setup(mgr, o, sanitizeSecrets); err != nil {
return err
}
return nil
}
27 changes: 21 additions & 6 deletions internal/controller/object/object.go
Original file line number Diff line number Diff line change
Expand Up @@ -87,17 +87,19 @@ const (
errGetConnectionDetails = "cannot get connection details"
errGetValueAtFieldPath = "cannot get value at fieldPath"
errDecodeSecretData = "cannot decode secret data"
errSanitizeSecretData = "cannot sanitize secret data"
)

// Setup adds a controller that reconciles Object managed resources.
func Setup(mgr ctrl.Manager, o controller.Options) error {
func Setup(mgr ctrl.Manager, o controller.Options, sanitizeSecrets bool) error {
name := managed.ControllerName(v1alpha2.ObjectGroupKind)

cps := []managed.ConnectionPublisher{managed.NewAPISecretPublisher(mgr.GetClient(), mgr.GetScheme())}

reconcilerOptions := []managed.ReconcilerOption{
managed.WithExternalConnecter(&connector{
logger: o.Logger,
sanitizeSecrets: sanitizeSecrets,
kube: mgr.GetClient(),
usage: resource.NewProviderConfigUsageTracker(mgr.GetClient(), &apisv1alpha1.ProviderConfigUsage{}),
kcfgExtractorFn: resource.CommonCredentialExtractor,
Expand Down Expand Up @@ -132,9 +134,10 @@ func Setup(mgr ctrl.Manager, o controller.Options) error {
}

type connector struct {
kube client.Client
usage resource.Tracker
logger logging.Logger
kube client.Client
usage resource.Tracker
logger logging.Logger
sanitizeSecrets bool

kcfgExtractorFn func(ctx context.Context, src xpv1.CredentialsSource, c client.Client, ccs xpv1.CommonCredentialSelectors) ([]byte, error)
gcpExtractorFn func(ctx context.Context, src xpv1.CredentialsSource, c client.Client, ccs xpv1.CommonCredentialSelectors) ([]byte, error)
Expand Down Expand Up @@ -232,15 +235,17 @@ func (c *connector) Connect(ctx context.Context, mg resource.Managed) (managed.E
Client: k,
Applicator: resource.NewAPIPatchingApplicator(k),
},
localClient: c.kube,
localClient: c.kube,
sanitizeSecrets: c.sanitizeSecrets,
}, nil
}

type external struct {
logger logging.Logger
client resource.ClientApplicator
// localClient is specifically used to connect to local cluster
localClient client.Client
localClient client.Client
sanitizeSecrets bool
}

func (c *external) Observe(ctx context.Context, mg resource.Managed) (managed.ExternalObservation, error) {
Expand Down Expand Up @@ -382,6 +387,16 @@ func getLastApplied(obj *v1alpha2.Object, observed *unstructured.Unstructured) (

func (c *external) setObserved(obj *v1alpha2.Object, observed *unstructured.Unstructured) error {
var err error

if c.sanitizeSecrets {
if observed.GetKind() == "Secret" && observed.GetAPIVersion() == "v1" {
data := map[string][]byte{"redacted": []byte(nil)}
if err = fieldpath.Pave(observed.Object).SetValue("data", data); err != nil {
return errors.Wrap(err, errSanitizeSecretData)
}
}
}

if obj.Status.AtProvider.Manifest.Raw, err = observed.MarshalJSON(); err != nil {
return errors.Wrap(err, errFailedToMarshalExisting)
}
Expand Down