/
delete.go
71 lines (55 loc) · 2.06 KB
/
delete.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
package vaultcrt
import (
"context"
"github.com/giantswarm/microerror"
"github.com/giantswarm/operatorkit/v7/pkg/resource/crud"
apiv1 "k8s.io/api/core/v1"
apierrors "k8s.io/apimachinery/pkg/api/errors"
apismetav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"github.com/giantswarm/cert-operator/v2/service/controller/key"
)
func (r *Resource) ApplyDeleteChange(ctx context.Context, obj, deleteChange interface{}) error {
secretToDelete, err := toSecret(deleteChange)
if err != nil {
return microerror.Mask(err)
}
if secretToDelete != nil {
customObject, err := key.ToCustomObject(obj)
if err != nil {
return microerror.Mask(err)
}
r.logger.LogCtx(ctx, "level", "debug", "message", "deleting the sercet in the Kubernetes API")
err = r.k8sClient.CoreV1().Secrets(customObject.GetNamespace()).Delete(ctx, secretToDelete.Name, apismetav1.DeleteOptions{})
if apierrors.IsNotFound(err) {
// fall through
} else if err != nil {
return microerror.Mask(err)
}
r.logger.LogCtx(ctx, "level", "debug", "message", "deleted the sercet in the Kubernetes API")
} else {
r.logger.LogCtx(ctx, "level", "debug", "message", "the sercet does not need to be deleted from the Kubernetes API")
}
return nil
}
func (r *Resource) NewDeletePatch(ctx context.Context, obj, currentState, desiredState interface{}) (*crud.Patch, error) {
delete, err := r.newDeleteChange(ctx, obj, currentState, desiredState)
if err != nil {
return nil, microerror.Mask(err)
}
patch := crud.NewPatch()
patch.SetDeleteChange(delete)
return patch, nil
}
func (r *Resource) newDeleteChange(ctx context.Context, obj, currentState, desiredState interface{}) (interface{}, error) {
currentSecret, err := toSecret(currentState)
if err != nil {
return nil, microerror.Mask(err)
}
r.logger.LogCtx(ctx, "level", "debug", "message", "finding out if the secret has to be deleted")
var secretToDelete *apiv1.Secret
if currentSecret != nil {
secretToDelete = currentSecret
}
r.logger.LogCtx(ctx, "level", "debug", "message", "found out if the secret has to be deleted")
return secretToDelete, nil
}