@@ -592,7 +592,7 @@ func (r *KubeadmConfigReconciler) handleClusterNotInitialized(ctx context.Contex
592
592
util .ObjectKey (scope .Cluster ))
593
593
}
594
594
if err != nil {
595
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
595
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
596
596
conditions .Set (scope .Config , metav1.Condition {
597
597
Type : bootstrapv1 .KubeadmConfigCertificatesAvailableCondition ,
598
598
Status : metav1 .ConditionUnknown ,
@@ -616,7 +616,7 @@ func (r *KubeadmConfigReconciler) handleClusterNotInitialized(ctx context.Contex
616
616
617
617
files , err := r .resolveFiles (ctx , scope .Config )
618
618
if err != nil {
619
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
619
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
620
620
conditions .Set (scope .Config , metav1.Condition {
621
621
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
622
622
Status : metav1 .ConditionFalse ,
@@ -628,7 +628,7 @@ func (r *KubeadmConfigReconciler) handleClusterNotInitialized(ctx context.Contex
628
628
629
629
users , err := r .resolveUsers (ctx , scope .Config )
630
630
if err != nil {
631
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
631
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
632
632
conditions .Set (scope .Config , metav1.Condition {
633
633
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
634
634
Status : metav1 .ConditionFalse ,
@@ -691,7 +691,7 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
691
691
util .ObjectKey (scope .Cluster ),
692
692
)
693
693
if err != nil {
694
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , err .Error ())
694
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , "%s" , err .Error ())
695
695
conditions .Set (scope .Config , metav1.Condition {
696
696
Type : bootstrapv1 .KubeadmConfigCertificatesAvailableCondition ,
697
697
Status : metav1 .ConditionUnknown ,
@@ -701,7 +701,7 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
701
701
return ctrl.Result {}, err
702
702
}
703
703
if err := certificates .EnsureAllExist (); err != nil {
704
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , err .Error ())
704
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , "%s" , err .Error ())
705
705
conditions .Set (scope .Config , metav1.Condition {
706
706
Type : bootstrapv1 .KubeadmConfigCertificatesAvailableCondition ,
707
707
Status : metav1 .ConditionUnknown ,
@@ -758,7 +758,7 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
758
758
759
759
files , err := r .resolveFiles (ctx , scope .Config )
760
760
if err != nil {
761
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
761
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
762
762
conditions .Set (scope .Config , metav1.Condition {
763
763
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
764
764
Status : metav1 .ConditionFalse ,
@@ -770,7 +770,7 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
770
770
771
771
users , err := r .resolveUsers (ctx , scope .Config )
772
772
if err != nil {
773
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
773
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
774
774
conditions .Set (scope .Config , metav1.Condition {
775
775
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
776
776
Status : metav1 .ConditionFalse ,
@@ -783,7 +783,7 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
783
783
if discoveryFile := scope .Config .Spec .JoinConfiguration .Discovery .File ; discoveryFile != nil && discoveryFile .KubeConfig != nil {
784
784
kubeconfig , err := r .resolveDiscoveryKubeConfig (discoveryFile )
785
785
if err != nil {
786
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
786
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
787
787
conditions .Set (scope .Config , metav1.Condition {
788
788
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
789
789
Status : metav1 .ConditionFalse ,
@@ -856,7 +856,7 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
856
856
util .ObjectKey (scope .Cluster ),
857
857
)
858
858
if err != nil {
859
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , err .Error ())
859
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , "%s" , err .Error ())
860
860
conditions .Set (scope .Config , metav1.Condition {
861
861
Type : bootstrapv1 .KubeadmConfigCertificatesAvailableCondition ,
862
862
Status : metav1 .ConditionUnknown ,
@@ -866,7 +866,7 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
866
866
return ctrl.Result {}, err
867
867
}
868
868
if err := certificates .EnsureAllExist (); err != nil {
869
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , err .Error ())
869
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .CertificatesAvailableV1Beta1Condition , bootstrapv1 .CertificatesCorruptedV1Beta1Reason , clusterv1 .ConditionSeverityError , "%s" , err .Error ())
870
870
conditions .Set (scope .Config , metav1.Condition {
871
871
Type : bootstrapv1 .KubeadmConfigCertificatesAvailableCondition ,
872
872
Status : metav1 .ConditionUnknown ,
@@ -911,7 +911,7 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
911
911
912
912
files , err := r .resolveFiles (ctx , scope .Config )
913
913
if err != nil {
914
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
914
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
915
915
conditions .Set (scope .Config , metav1.Condition {
916
916
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
917
917
Status : metav1 .ConditionFalse ,
@@ -923,7 +923,7 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
923
923
924
924
users , err := r .resolveUsers (ctx , scope .Config )
925
925
if err != nil {
926
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
926
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
927
927
conditions .Set (scope .Config , metav1.Condition {
928
928
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
929
929
Status : metav1 .ConditionFalse ,
@@ -936,7 +936,7 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
936
936
if discoveryFile := scope .Config .Spec .JoinConfiguration .Discovery .File ; discoveryFile != nil && discoveryFile .KubeConfig != nil {
937
937
kubeconfig , err := r .resolveDiscoveryKubeConfig (discoveryFile )
938
938
if err != nil {
939
- v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , err .Error ())
939
+ v1beta1conditions .MarkFalse (scope .Config , bootstrapv1 .DataSecretAvailableV1Beta1Condition , bootstrapv1 .DataSecretGenerationFailedV1Beta1Reason , clusterv1 .ConditionSeverityWarning , "%s" , err .Error ())
940
940
conditions .Set (scope .Config , metav1.Condition {
941
941
Type : bootstrapv1 .KubeadmConfigDataSecretAvailableCondition ,
942
942
Status : metav1 .ConditionFalse ,
0 commit comments