@@ -36,11 +36,6 @@ const (
3636 encryptPrio = exemptPrio + 1
3737)
3838
39- var exemptPorts = []netlink.RulePortRange {
40- {Start : 2379 , End : 2380 },
41- {Start : 6443 , End : 6443 },
42- }
43-
4439// Reconciler runs the async reconciliation loop
4540type Reconciler struct {
4641 state state.State
@@ -158,7 +153,7 @@ func (r *Reconciler) reconcile(ctx context.Context) {
158153 dstNet := parseIPv4OrCIDR (addr )
159154 if dstNet != nil {
160155 encryptIPs [addr ] = dstNet
161- if nodeType == NodeTypeWorker {
156+ if nodeType == NodeTypeControlPlane {
162157 exemptIPs [addr ] = dstNet
163158 }
164159 }
@@ -205,7 +200,7 @@ func (r *Reconciler) reconcile(ctx context.Context) {
205200 for dst := range sets .KeySet (exemptIPs ).Difference (r .readyExempts ) {
206201 dstNet := exemptIPs [dst ]
207202 err = nil
208- for _ , rule := range buildExemptRules (dstNet ) {
203+ for _ , rule := range r . buildExemptRules (dstNet ) {
209204 if err = r .ensureRule (rule ); err != nil {
210205 break
211206 }
@@ -234,7 +229,7 @@ func (r *Reconciler) reconcile(ctx context.Context) {
234229 for obsoleteDst := range r .readyExempts .Difference (sets .KeySet (exemptIPs )) {
235230 dstNet := parseIPv4OrCIDR (obsoleteDst )
236231 err = nil
237- for _ , rule := range buildExemptRules (dstNet ) {
232+ for _ , rule := range r . buildExemptRules (dstNet ) {
238233 if err = r .ensureRuleRemoved (rule ); err != nil {
239234 break
240235 }
@@ -305,9 +300,9 @@ func buildEncryptionRule(dst *net.IPNet) *netlink.Rule {
305300 return buildRule (dst , false )
306301}
307302
308- func buildExemptRules (dst * net.IPNet ) []* netlink.Rule {
303+ func ( r Reconciler ) buildExemptRules (dst * net.IPNet ) []* netlink.Rule {
309304 rules := make ([]* netlink.Rule , 0 )
310- for _ , portRange := range exemptPorts {
305+ for _ , portRange := range r . options . ControlPlaneExemptPorts {
311306 rule := buildRule (dst , true )
312307 rule .Dport = & portRange
313308 rules = append (rules , rule )
0 commit comments