@@ -58,18 +58,18 @@ func labelsForWireguard(name string) map[string]string {
58
58
return map [string ]string {"app" : "wireguard" , "instance" : name }
59
59
}
60
60
61
- func (r * WireguardReconciler ) ConfigmapForWireguard (m * v1alpha1.Wireguard , hostname string ) (* corev1.ConfigMap , error ) {
61
+ func (r * WireguardReconciler ) ConfigmapForWireguard (m * v1alpha1.Wireguard , hostname string ) * corev1.ConfigMap {
62
+ ls := labelsForWireguard (m .Name )
62
63
dep := & corev1.ConfigMap {
63
64
ObjectMeta : metav1.ObjectMeta {
64
65
Name : m .Name + "-config" ,
65
66
Namespace : m .Namespace ,
66
- Labels : labelsForWireguard ( m . Name ) ,
67
+ Labels : ls ,
67
68
},
68
69
}
69
- if err := ctrl .SetControllerReference (m , dep , r .Scheme ); err != nil {
70
- return nil , fmt .Errorf ("set controller reference: %w" , err )
71
- }
72
- return dep , nil
70
+
71
+ ctrl .SetControllerReference (m , dep , r .Scheme )
72
+ return dep
73
73
}
74
74
75
75
func (r * WireguardReconciler ) getWireguardPeers (ctx context.Context , req ctrl.Request ) (* v1alpha1.WireguardPeerList , error ) {
@@ -311,11 +311,7 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
311
311
err = r .Get (ctx , types.NamespacedName {Name : wireguard .Name + "-metrics-svc" , Namespace : wireguard .Namespace }, svcFound )
312
312
if err != nil && errors .IsNotFound (err ) {
313
313
314
- svc , err := r .serviceForWireguardMetrics (wireguard )
315
- if err != nil {
316
- return ctrl.Result {}, fmt .Errorf ("service for wireguard metrics: %w" , err )
317
- }
318
-
314
+ svc := r .serviceForWireguardMetrics (wireguard )
319
315
log .Info ("Creating a new service" , "service.Namespace" , svc .Namespace , "service.Name" , svc .Name )
320
316
err = r .Create (ctx , svc )
321
317
if err != nil {
@@ -361,11 +357,7 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
361
357
362
358
err = r .Get (ctx , types.NamespacedName {Name : wireguard .Name + "-svc" , Namespace : wireguard .Namespace }, svcFound )
363
359
if err != nil && errors .IsNotFound (err ) {
364
- svc , err := r .serviceForWireguard (wireguard , serviceType )
365
- if err != nil {
366
- return ctrl.Result {}, fmt .Errorf ("service for wireguard: %w" , err )
367
- }
368
-
360
+ svc := r .serviceForWireguard (wireguard , serviceType )
369
361
log .Info ("Creating a new service" , "service.Namespace" , svc .Namespace , "service.Name" , svc .Name )
370
362
err = r .Create (ctx , svc )
371
363
if err != nil {
@@ -487,15 +479,10 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
487
479
488
480
if ! bytes .Equal (b , secret .Data ["state.json" ]) {
489
481
log .Info ("Updating secret with new config" )
490
-
491
482
publicKey := string (secret .Data ["publicKey" ])
492
483
493
- secret , err := r .secretForWireguard (wireguard , b , privateKey , publicKey )
484
+ err := r .Update ( ctx , r . secretForWireguard (wireguard , b , privateKey , publicKey ) )
494
485
if err != nil {
495
- return ctrl.Result {}, fmt .Errorf ("secret for wireguard: %w" , err )
496
- }
497
-
498
- if err := r .Update (ctx , secret ); err != nil {
499
486
log .Error (err , "Failed to update secret with new config" )
500
487
return ctrl.Result {}, err
501
488
}
@@ -547,39 +534,14 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
547
534
return ctrl.Result {}, err
548
535
}
549
536
550
- bytes .Equal (b , secret .Data ["state" ])
551
-
552
- secret , err := r .secretForWireguard (wireguard , b , privateKey , publicKey )
553
- if err != nil {
554
- return ctrl.Result {}, fmt .Errorf ("secret for wireguard: %w" , err )
555
- }
537
+ secret := r .secretForWireguard (wireguard , b , privateKey , publicKey )
556
538
557
539
log .Info ("Creating a new secret" , "secret.Namespace" , secret .Namespace , "secret.Name" , secret .Name )
558
540
559
541
if err := r .Create (ctx , secret ); err != nil {
560
542
log .Error (err , "Failed to create new secret" , "secret.Namespace" , secret .Namespace , "secret.Name" , secret .Name )
561
543
return ctrl.Result {}, err
562
544
}
563
-
564
- clientKey , err := wgtypes .GeneratePrivateKey ()
565
-
566
- if err != nil {
567
- log .Error (err , "Failed to generate private key" )
568
- return ctrl.Result {}, err
569
- }
570
-
571
- clientSecret , err := r .secretForClient (wireguard , clientKey .String (), clientKey .PublicKey ().String ())
572
- if err != nil {
573
- return ctrl.Result {}, fmt .Errorf ("secret for client: %w" , err )
574
- }
575
-
576
- log .Info ("Creating a new secret" , "secret.Namespace" , clientSecret .Namespace , "secret.Name" , clientSecret .Name )
577
- err = r .Create (ctx , clientSecret )
578
- if err != nil {
579
- log .Error (err , "Failed to create new secret" , "secret.Namespace" , clientSecret .Namespace , "secret.Name" , clientSecret .Name )
580
- return ctrl.Result {}, err
581
- }
582
-
583
545
return ctrl.Result {}, err
584
546
} else if err != nil {
585
547
log .Error (err , "Failed to get secret" )
@@ -591,14 +553,10 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
591
553
configFound := & corev1.ConfigMap {}
592
554
err = r .Get (ctx , types.NamespacedName {Name : wireguard .Name + "-config" , Namespace : wireguard .Namespace }, configFound )
593
555
if err != nil && errors .IsNotFound (err ) {
594
- config , err := r .ConfigmapForWireguard (wireguard , address )
595
- if err != nil {
596
- return ctrl.Result {}, fmt .Errorf ("config map for wireguard: %w" , err )
597
- }
598
-
556
+ config := r .ConfigmapForWireguard (wireguard , address )
599
557
log .Info ("Creating a new config" , "config.Namespace" , config .Namespace , "config.Name" , config .Name )
600
-
601
- if err := r . Create ( ctx , config ); err != nil {
558
+ err = r . Create ( ctx , config )
559
+ if err != nil {
602
560
log .Error (err , "Failed to create new dep" , "dep.Namespace" , config .Namespace , "dep.Name" , config .Name )
603
561
return ctrl.Result {}, err
604
562
}
@@ -616,11 +574,7 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
616
574
deploymentFound := & appsv1.Deployment {}
617
575
err = r .Get (ctx , types.NamespacedName {Name : wireguard .Name + "-dep" , Namespace : wireguard .Namespace }, deploymentFound )
618
576
if err != nil && errors .IsNotFound (err ) {
619
- dep , err := r .deploymentForWireguard (wireguard )
620
- if err != nil {
621
- return ctrl.Result {}, fmt .Errorf ("deployment for wireguard: %w" , err )
622
- }
623
-
577
+ dep := r .deploymentForWireguard (wireguard )
624
578
log .Info ("Creating a new dep" , "dep.Namespace" , dep .Namespace , "dep.Name" , dep .Name )
625
579
err = r .Create (ctx , dep )
626
580
if err != nil {
@@ -635,12 +589,9 @@ func (r *WireguardReconciler) Reconcile(ctx context.Context, req ctrl.Request) (
635
589
}
636
590
637
591
if deploymentFound .Spec .Template .Spec .Containers [0 ].Image != r .AgentImage {
638
- dep , err := r .deploymentForWireguard (wireguard )
592
+ dep := r .deploymentForWireguard (wireguard )
593
+ err = r .Update (ctx , dep )
639
594
if err != nil {
640
- return ctrl.Result {}, fmt .Errorf ("deployment for wireguard: %w" , err )
641
- }
642
-
643
- if err := r .Update (ctx , dep ); err != nil {
644
595
log .Error (err , "unable to update deployment image" , "dep.Namespace" , dep .Namespace , "dep.Name" , dep .Name )
645
596
return ctrl.Result {}, err
646
597
}
@@ -673,10 +624,10 @@ func (r *WireguardReconciler) SetupWithManager(mgr ctrl.Manager) error {
673
624
Complete (r )
674
625
}
675
626
676
- func (r * WireguardReconciler ) serviceForWireguard (m * v1alpha1.Wireguard , serviceType corev1.ServiceType ) ( * corev1.Service , error ) {
627
+ func (r * WireguardReconciler ) serviceForWireguard (m * v1alpha1.Wireguard , serviceType corev1.ServiceType ) * corev1.Service {
677
628
labels := labelsForWireguard (m .Name )
678
629
679
- svc := & corev1.Service {
630
+ dep := & corev1.Service {
680
631
ObjectMeta : metav1.ObjectMeta {
681
632
Name : m .Name + "-svc" ,
682
633
Namespace : m .Namespace ,
@@ -695,20 +646,18 @@ func (r *WireguardReconciler) serviceForWireguard(m *v1alpha1.Wireguard, service
695
646
},
696
647
}
697
648
698
- if svc .Spec .Type == corev1 .ServiceTypeLoadBalancer {
699
- svc .Spec .LoadBalancerIP = m .Spec .Address
649
+ if dep .Spec .Type == corev1 .ServiceTypeLoadBalancer {
650
+ dep .Spec .LoadBalancerIP = m .Spec .Address
700
651
}
701
652
702
- if err := ctrl .SetControllerReference (m , svc , r .Scheme ); err != nil {
703
- return nil , fmt .Errorf ("set controller reference: %w" , err )
704
- }
705
- return svc , nil
653
+ ctrl .SetControllerReference (m , dep , r .Scheme )
654
+ return dep
706
655
}
707
656
708
- func (r * WireguardReconciler ) serviceForWireguardMetrics (m * v1alpha1.Wireguard ) ( * corev1.Service , error ) {
657
+ func (r * WireguardReconciler ) serviceForWireguardMetrics (m * v1alpha1.Wireguard ) * corev1.Service {
709
658
labels := labelsForWireguard (m .Name )
710
659
711
- svc := & corev1.Service {
660
+ dep := & corev1.Service {
712
661
ObjectMeta : metav1.ObjectMeta {
713
662
Name : m .Name + "-metrics-svc" ,
714
663
Namespace : m .Namespace ,
@@ -726,48 +675,29 @@ func (r *WireguardReconciler) serviceForWireguardMetrics(m *v1alpha1.Wireguard)
726
675
},
727
676
}
728
677
729
- if err := ctrl .SetControllerReference (m , svc , r .Scheme ); err != nil {
730
- return nil , fmt .Errorf ("set controller reference: %w" , err )
731
- }
732
- return svc , nil
678
+ ctrl .SetControllerReference (m , dep , r .Scheme )
679
+ return dep
733
680
}
734
681
735
- func (r * WireguardReconciler ) secretForWireguard (m * v1alpha1.Wireguard , state []byte , privateKey string , publicKey string ) (* corev1.Secret , error ) {
736
- secret := & corev1.Secret {
682
+ func (r * WireguardReconciler ) secretForWireguard (m * v1alpha1.Wireguard , state []byte , privateKey string , publicKey string ) * corev1.Secret {
683
+
684
+ ls := labelsForWireguard (m .Name )
685
+ dep := & corev1.Secret {
737
686
ObjectMeta : metav1.ObjectMeta {
738
687
Name : m .Name ,
739
688
Namespace : m .Namespace ,
740
- Labels : labelsForWireguard ( m . Name ) ,
689
+ Labels : ls ,
741
690
},
742
691
Data : map [string ][]byte {"state.json" : state , "privateKey" : []byte (privateKey ), "publicKey" : []byte (publicKey )},
743
692
}
744
693
745
- if err := ctrl .SetControllerReference (m , secret , r .Scheme ); err != nil {
746
- return nil , fmt .Errorf ("set controller reference: %w" , err )
747
- }
748
-
749
- return secret , nil
750
-
751
- }
752
-
753
- func (r * WireguardReconciler ) secretForClient (m * v1alpha1.Wireguard , privateKey string , publicKey string ) (* corev1.Secret , error ) {
754
- secret := & corev1.Secret {
755
- ObjectMeta : metav1.ObjectMeta {
756
- Name : m .Name + "-client" ,
757
- Namespace : m .Namespace ,
758
- Labels : labelsForWireguard (m .Name ),
759
- },
760
- Data : map [string ][]byte {"privateKey" : []byte (privateKey ), "publicKey" : []byte (publicKey )},
761
- }
694
+ ctrl .SetControllerReference (m , dep , r .Scheme )
762
695
763
- if err := ctrl .SetControllerReference (m , secret , r .Scheme ); err != nil {
764
- return nil , fmt .Errorf ("set controller reference: %w" , err )
765
- }
766
- return secret , nil
696
+ return dep
767
697
768
698
}
769
699
770
- func (r * WireguardReconciler ) deploymentForWireguard (m * v1alpha1.Wireguard ) ( * appsv1.Deployment , error ) {
700
+ func (r * WireguardReconciler ) deploymentForWireguard (m * v1alpha1.Wireguard ) * appsv1.Deployment {
771
701
ls := labelsForWireguard (m .Name )
772
702
replicas := int32 (1 )
773
703
@@ -910,8 +840,6 @@ func (r *WireguardReconciler) deploymentForWireguard(m *v1alpha1.Wireguard) (*ap
910
840
}
911
841
}
912
842
913
- if err := ctrl .SetControllerReference (m , dep , r .Scheme ); err != nil {
914
- return dep , fmt .Errorf ("set controller reference: %w" , err )
915
- }
916
- return dep , nil
843
+ ctrl .SetControllerReference (m , dep , r .Scheme )
844
+ return dep
917
845
}
0 commit comments