@@ -164,20 +164,14 @@ func (r *WgGatewayServerReconciler) Reconcile(ctx context.Context, req ctrl.Requ
164
164
return ctrl.Result {}, err
165
165
}
166
166
167
- if err := r .handleSecretRefStatus (ctx , wgServer ); err != nil {
168
- klog .Errorf ("Error while handling secret ref status: %v" , err )
169
- r .eventRecorder .Event (wgServer , corev1 .EventTypeWarning , "SecretRefStatusFailed" ,
170
- fmt .Sprintf ("Failed to handle secret ref status: %s" , err ))
171
- return ctrl.Result {}, err
172
- }
173
-
174
167
if err := r .handleInternalEndpointStatus (ctx , wgServer , svcNsName , deploy ); err != nil {
175
168
klog .Errorf ("Error while handling internal endpoint status: %v" , err )
176
169
r .eventRecorder .Event (wgServer , corev1 .EventTypeWarning , "InternalEndpointStatusFailed" ,
177
170
fmt .Sprintf ("Failed to handle internal endpoint status: %s" , err ))
178
171
return ctrl.Result {}, err
179
172
}
180
173
174
+ // If a secret has not been provided in the gateway specification, the controller is in charge of generating a secret with the Wireguard keys.
181
175
if wgServer .Spec .SecretRef .Name == "" {
182
176
// Ensure WireGuard keys secret (create or update)
183
177
if err = ensureKeysSecret (ctx , r .Client , wgServer , gateway .ModeServer ); err != nil {
@@ -187,13 +181,20 @@ func (r *WgGatewayServerReconciler) Reconcile(ctx context.Context, req ctrl.Requ
187
181
r .eventRecorder .Event (wgServer , corev1 .EventTypeNormal , "KeysSecretEnforced" , "Enforced keys secret" )
188
182
} else {
189
183
// Check that the secret exists and is correctly labeled
190
- if err = checkExistingKeysSecret (ctx , r .Client , wgServer .Status .SecretRef .Name , wgServer .Namespace ); err != nil {
184
+ if err = checkExistingKeysSecret (ctx , r .Client , wgServer .Spec .SecretRef .Name , wgServer .Namespace ); err != nil {
191
185
r .eventRecorder .Event (wgServer , corev1 .EventTypeWarning , "KeysSecretCheckFailed" , fmt .Sprintf ("Failed to check keys secret: %s" , err ))
192
186
return ctrl.Result {}, err
193
187
}
194
188
r .eventRecorder .Event (wgServer , corev1 .EventTypeNormal , "KeysSecretChecked" , "Checked keys secret" )
195
189
}
196
190
191
+ if err := r .handleSecretRefStatus (ctx , wgServer ); err != nil {
192
+ klog .Errorf ("Error while handling secret ref status: %v" , err )
193
+ r .eventRecorder .Event (wgServer , corev1 .EventTypeWarning , "SecretRefStatusFailed" ,
194
+ fmt .Sprintf ("Failed to handle secret ref status: %s" , err ))
195
+ return ctrl.Result {}, err
196
+ }
197
+
197
198
// Ensure deployment (create or update)
198
199
_ , err = r .ensureDeployment (ctx , wgServer , deployNsName )
199
200
if err != nil {
0 commit comments