|
|
@ -29,7 +29,6 @@ import (
|
|
|
|
"sigs.k8s.io/yaml"
|
|
|
|
"sigs.k8s.io/yaml"
|
|
|
|
"tailscale.com/client/tailscale"
|
|
|
|
"tailscale.com/client/tailscale"
|
|
|
|
"tailscale.com/ipn"
|
|
|
|
"tailscale.com/ipn"
|
|
|
|
kubeutils "tailscale.com/k8s-operator"
|
|
|
|
|
|
|
|
tsoperator "tailscale.com/k8s-operator"
|
|
|
|
tsoperator "tailscale.com/k8s-operator"
|
|
|
|
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
|
|
|
|
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
|
|
|
|
"tailscale.com/net/netutil"
|
|
|
|
"tailscale.com/net/netutil"
|
|
|
@ -346,7 +345,7 @@ func (a *tailscaleSTSReconciler) createOrGetSecret(ctx context.Context, logger *
|
|
|
|
latest := tailcfg.CapabilityVersion(-1)
|
|
|
|
latest := tailcfg.CapabilityVersion(-1)
|
|
|
|
var latestConfig ipn.ConfigVAlpha
|
|
|
|
var latestConfig ipn.ConfigVAlpha
|
|
|
|
for key, val := range configs {
|
|
|
|
for key, val := range configs {
|
|
|
|
fn := kubeutils.TailscaledConfigFileNameForCap(key)
|
|
|
|
fn := tsoperator.TailscaledConfigFileNameForCap(key)
|
|
|
|
b, err := json.Marshal(val)
|
|
|
|
b, err := json.Marshal(val)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
return "", "", nil, fmt.Errorf("error marshalling tailscaled config: %w", err)
|
|
|
|
return "", "", nil, fmt.Errorf("error marshalling tailscaled config: %w", err)
|
|
|
@ -776,7 +775,7 @@ func tailscaledConfig(stsC *tailscaleSTSConfig, newAuthkey string, oldSecret *co
|
|
|
|
if len(data) == 0 {
|
|
|
|
if len(data) == 0 {
|
|
|
|
continue
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
v, err := kubeutils.CapVerFromFileName(k)
|
|
|
|
v, err := tsoperator.CapVerFromFileName(k)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|