@@ -50,11 +50,11 @@ var (
50
50
51
51
// CertGenerator is the manager to generate certs.
52
52
type CertGenerator struct {
53
- namespace string
54
- serviceName string
55
- secretName string
56
- kubeClient client.Client
57
- certsReady chan struct {}
53
+ namespace string
54
+ webhookServiceName string
55
+ webhookSecretName string
56
+ kubeClient client.Client
57
+ certsReady chan struct {}
58
58
59
59
certs * certificates
60
60
fullServiceDomain string
@@ -79,18 +79,18 @@ func (c *CertGenerator) NeedLeaderElection() bool {
79
79
// AddToManager adds the cert-generator to the manager.
80
80
func AddToManager (mgr manager.Manager , config configv1beta1.CertGeneratorConfig , certsReady chan struct {}) error {
81
81
return mgr .Add (& CertGenerator {
82
- namespace : consts .DefaultKatibNamespace ,
83
- serviceName : config .WebhookServiceName ,
84
- secretName : config .WebhookSecretName ,
85
- kubeClient : mgr .GetClient (),
86
- certsReady : certsReady ,
82
+ namespace : consts .DefaultKatibNamespace ,
83
+ webhookServiceName : config .WebhookServiceName ,
84
+ webhookSecretName : config .WebhookSecretName ,
85
+ kubeClient : mgr .GetClient (),
86
+ certsReady : certsReady ,
87
87
})
88
88
}
89
89
90
90
// generate generates certificates for the admission webhooks.
91
91
func (c * CertGenerator ) generate (ctx context.Context ) error {
92
92
controllerService := & corev1.Service {}
93
- if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .serviceName , Namespace : c .namespace }, controllerService ); err != nil {
93
+ if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .webhookServiceName , Namespace : c .namespace }, controllerService ); err != nil {
94
94
return fmt .Errorf ("%w: %v" , errServiceNotFound , err )
95
95
}
96
96
@@ -99,7 +99,7 @@ func (c *CertGenerator) generate(ctx context.Context) error {
99
99
return fmt .Errorf ("%w: %v" , errCertCheckFail , err )
100
100
}
101
101
if ! certExist {
102
- c .fullServiceDomain = strings .Join ([]string {c .serviceName , c .namespace , "svc" }, "." )
102
+ c .fullServiceDomain = strings .Join ([]string {c .webhookServiceName , c .namespace , "svc" }, "." )
103
103
104
104
if err = c .createCert (); err != nil {
105
105
return fmt .Errorf ("%w: %v" , errCreateCertFail , err )
@@ -119,7 +119,7 @@ func (c *CertGenerator) generate(ctx context.Context) error {
119
119
// since another controller pod will create the secret.
120
120
func (c * CertGenerator ) isCertExist (ctx context.Context ) (bool , error ) {
121
121
secret := & corev1.Secret {}
122
- if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .secretName , Namespace : c .namespace }, secret ); err != nil {
122
+ if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .webhookSecretName , Namespace : c .namespace }, secret ); err != nil {
123
123
return false , err
124
124
}
125
125
key := secret .Data [serverKeyName ]
@@ -170,7 +170,7 @@ func (c *CertGenerator) createCert() error {
170
170
// updateCertSecret updates Secret embedded tls.key and tls.crt.
171
171
func (c * CertGenerator ) updateCertSecret (ctx context.Context ) error {
172
172
secret := & corev1.Secret {}
173
- if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .secretName , Namespace : c .namespace }, secret ); err != nil {
173
+ if err := c .kubeClient .Get (ctx , client.ObjectKey {Name : c .webhookSecretName , Namespace : c .namespace }, secret ); err != nil {
174
174
return err
175
175
}
176
176
newSecret := & corev1.Secret {
0 commit comments