|
65 | 65 | ) |
66 | 66 |
|
67 | 67 | const ( |
68 | | - FleetWebhookCertDir = "/tmp/k8s-webhook-server/serving-certs" |
69 | | - FleetWebhookPort = 9443 |
| 68 | + FleetWebhookPort = 9443 |
70 | 69 | ) |
71 | 70 |
|
72 | 71 | func init() { |
@@ -121,7 +120,7 @@ func main() { |
121 | 120 | }, |
122 | 121 | WebhookServer: ctrlwebhook.NewServer(ctrlwebhook.Options{ |
123 | 122 | Port: FleetWebhookPort, |
124 | | - CertDir: FleetWebhookCertDir, |
| 123 | + CertDir: opts.WebhookCertDir, |
125 | 124 | }), |
126 | 125 | } |
127 | 126 | if opts.EnablePprof { |
@@ -159,7 +158,7 @@ func main() { |
159 | 158 | if opts.EnableWebhook { |
160 | 159 | whiteListedUsers := strings.Split(opts.WhiteListedUsers, ",") |
161 | 160 | if err := SetupWebhook(mgr, options.WebhookClientConnectionType(opts.WebhookClientConnectionType), opts.WebhookServiceName, whiteListedUsers, |
162 | | - opts.EnableGuardRail, opts.EnableV1Beta1APIs, opts.DenyModifyMemberClusterLabels, opts.EnableWorkload, opts.NetworkingAgentsEnabled, opts.UseCertManager); err != nil { |
| 161 | + opts.EnableGuardRail, opts.EnableV1Beta1APIs, opts.DenyModifyMemberClusterLabels, opts.EnableWorkload, opts.NetworkingAgentsEnabled, opts.UseCertManager, opts.WebhookCertDir, opts.WebhookCertSecretName); err != nil { |
163 | 162 | klog.ErrorS(err, "unable to set up webhook") |
164 | 163 | exitWithErrorFunc() |
165 | 164 | } |
@@ -202,9 +201,9 @@ func main() { |
202 | 201 |
|
203 | 202 | // SetupWebhook generates the webhook cert and then set up the webhook configurator. |
204 | 203 | func SetupWebhook(mgr manager.Manager, webhookClientConnectionType options.WebhookClientConnectionType, webhookServiceName string, |
205 | | - whiteListedUsers []string, enableGuardRail, isFleetV1Beta1API bool, denyModifyMemberClusterLabels bool, enableWorkload bool, networkingAgentsEnabled bool, useCertManager bool) error { |
206 | | - // Generate self-signed key and crt files in FleetWebhookCertDir for the webhook server to start. |
207 | | - w, err := webhook.NewWebhookConfig(mgr, webhookServiceName, FleetWebhookPort, &webhookClientConnectionType, FleetWebhookCertDir, enableGuardRail, denyModifyMemberClusterLabels, enableWorkload, useCertManager) |
| 204 | + whiteListedUsers []string, enableGuardRail, isFleetV1Beta1API bool, denyModifyMemberClusterLabels bool, enableWorkload bool, networkingAgentsEnabled bool, useCertManager bool, webhookCertDir string, webhookCertSecretName string) error { |
| 205 | + // Generate self-signed key and crt files in webhookCertDir for the webhook server to start. |
| 206 | + w, err := webhook.NewWebhookConfig(mgr, webhookServiceName, FleetWebhookPort, &webhookClientConnectionType, webhookCertDir, enableGuardRail, denyModifyMemberClusterLabels, enableWorkload, useCertManager, webhookCertSecretName) |
208 | 207 | if err != nil { |
209 | 208 | klog.ErrorS(err, "fail to generate WebhookConfig") |
210 | 209 | return err |
|
0 commit comments