support TLS configuration for LWS#783
support TLS configuration for LWS#783Mostafahassen1 wants to merge 3 commits intokubernetes-sigs:mainfrom
Conversation
✅ Deploy Preview for kubernetes-sigs-lws canceled.
|
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Mostafahassen1 The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Hi @Mostafahassen1. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/cc @kannon92 , @ardaguclu |
kannon92
left a comment
There was a problem hiding this comment.
Looks good at a high level. I think there are a few changes that need to be removed.
| kind: Configuration | ||
| leaderElection: | ||
| leaderElect: true | ||
| internalCertManagement: |
There was a problem hiding this comment.
This seems like it's not needed.
config/manager/kustomization.yaml
Outdated
| images: | ||
| - name: controller | ||
| newName: us-central1-docker.pkg.dev/k8s-staging-images/lws/lws | ||
| newName: us-central1-docker.pkg.dev/k8s-staging-images/lws |
|
/ok-to-test |
|
@Mostafahassen1: The following test failed, say
Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
Thank you for triggering the tests! I noticed that the I looked into the test logs, and the failures are occurring in I want to make sure I follow the best practices for this project. Could you advise on your preferred approach to fix this? |
What type of PR is this?
/kind feature
/kind api-change
What this PR does / why we need it
This PR introduces TLS support for the LWS webhook server, allowing secure communication by specifying minimum TLS versions and cipher suites.
Changes included in this PR:
TLSOptionstoapi/config/v1alpha1/configuration_types.goand regenerated deepcopy methods.pkg/config/tls.goto handle parsing and createdvalidateTLSOptionsinpkg/config/validation.go.addTo()and into a new exported functionAddWebhookSettingsToinpkg/config/config.goto prevent configuration conflicts.cmd/main.goto parse the TLS options and properly wire them to the newAddWebhookSettingsTofunction.tls:stanza to the controller manager config.Which issue(s) this PR fixes
Fixes #[#723]
Special notes for your reviewer
make test). During local E2E testing (make test-e2e),