@@ -116,7 +116,7 @@ func (a *CRDTemplateAgentAddon) TemplateCSRConfigurationsFunc() agent.CSRConfigu
116
116
configs , err := agent .KubeClientSignerConfigurations (a .addonName , a .agentName )(cluster , addon )
117
117
if err != nil {
118
118
return nil , fmt .Errorf ("failed to get kube signer config for %s/%s: %v" ,
119
- a . addonName , a .agentName , err )
119
+ cluster . Name , a .addonName , err )
120
120
}
121
121
registrationConfigs = append (registrationConfigs , configs ... )
122
122
}
@@ -136,8 +136,8 @@ func (a *CRDTemplateAgentAddon) TemplateCSRConfigurationsFunc() agent.CSRConfigu
136
136
}
137
137
138
138
default :
139
- a .logger .Info ("CSRConfigurations unsupported registration type" , "cluster" , cluster . Name , "addon" , a . addonName ,
140
- "type" , registration .Type )
139
+ a .logger .Info ("CSRConfigurations unsupported registration type" ,
140
+ "clusterName" , cluster . Name , "addonName" , a . addonName , " type" , registration .Type )
141
141
}
142
142
143
143
}
@@ -178,10 +178,13 @@ func (a *CRDTemplateAgentAddon) TemplateCSRApproveCheckFunc() agent.CSRApproveFu
178
178
179
179
template , err := a .GetDesiredAddOnTemplate (addon , cluster .Name , a .addonName )
180
180
if err != nil {
181
- a .logger .Info ("CSRApproveCheck failed to get addon template" , "addonName" , a .addonName , "error" , err )
181
+ a .logger .Info ("CSRApproveCheck failed to get addon template" ,
182
+ "clusterName" , cluster .Name , "addonName" , a .addonName , "error" , err )
182
183
return false
183
184
}
184
185
if template == nil {
186
+ a .logger .Info ("CSRApproveCheck failed to get addon template, template is nil" ,
187
+ "clusterName" , cluster .Name , "addonName" , a .addonName )
185
188
return false
186
189
}
187
190
@@ -202,8 +205,8 @@ func (a *CRDTemplateAgentAddon) TemplateCSRApproveCheckFunc() agent.CSRApproveFu
202
205
}
203
206
204
207
default :
205
- a .logger .Info ("CSRApproveCheck unsupported registration type" , "cluster" , cluster . Name , "addon" , a . addonName ,
206
- "type" , registration .Type )
208
+ a .logger .Info ("CSRApproveCheck unsupported registration type" ,
209
+ "clusterName" , cluster . Name , "addonName" , a . addonName , " type" , registration .Type )
207
210
}
208
211
209
212
}
@@ -247,11 +250,12 @@ func (a *CRDTemplateAgentAddon) TemplateCSRSignFunc() agent.CSRSignerFunc {
247
250
csr * certificatesv1.CertificateSigningRequest ) ([]byte , error ) {
248
251
template , err := a .GetDesiredAddOnTemplate (addon , cluster .Name , a .addonName )
249
252
if err != nil {
250
- return nil , fmt .Errorf ("CSRSign failed to get template for addon %s in cluster %s: %v" ,
251
- a . addonName , cluster . Name , err )
253
+ return nil , fmt .Errorf ("CSRSign failed to get template for addon %s/ %s: %v" ,
254
+ cluster . Name , a . addonName , err )
252
255
}
253
256
if template == nil {
254
- return nil , nil
257
+ return nil , fmt .Errorf ("CSRSign failed to get addon template for addon %s/%s, template is nil" ,
258
+ cluster .Name , a .addonName )
255
259
}
256
260
257
261
for _ , registration := range template .Spec .Registration {
@@ -268,8 +272,8 @@ func (a *CRDTemplateAgentAddon) TemplateCSRSignFunc() agent.CSRSignerFunc {
268
272
}
269
273
270
274
default :
271
- a .logger .Info ("CSRSign unsupported registration type" , "cluster" , cluster . Name , "addon" , a . addonName ,
272
- "type" , registration .Type )
275
+ a .logger .Info ("CSRSign unsupported registration type" ,
276
+ "clusterName" , cluster . Name , "addonName" , a . addonName , " type" , registration .Type )
273
277
}
274
278
275
279
}
@@ -286,7 +290,7 @@ func CustomSignerWithExpiry(
286
290
return func (cluster * clusterv1.ManagedCluster , addon * addonapiv1alpha1.ManagedClusterAddOn ,
287
291
csr * certificatesv1.CertificateSigningRequest ) ([]byte , error ) {
288
292
if customSignerConfig == nil {
289
- return nil , fmt .Errorf ("custome signer config is nil" )
293
+ return nil , fmt .Errorf ("custom signer config is nil" )
290
294
}
291
295
292
296
if csr .Spec .SignerName != customSignerConfig .SignerName {
@@ -300,13 +304,13 @@ func CustomSignerWithExpiry(
300
304
caSecret , err := kubeclient .CoreV1 ().Secrets (secretNamespace ).Get (
301
305
context .TODO (), customSignerConfig .SigningCA .Name , metav1.GetOptions {})
302
306
if err != nil {
303
- return nil , fmt .Errorf ("get custome signer ca %s/%s failed, %v " ,
307
+ return nil , fmt .Errorf ("get custom signer ca %s/%s failed: %w " ,
304
308
secretNamespace , customSignerConfig .SigningCA .Name , err )
305
309
}
306
310
307
311
caData , caKey , err := extractCAdata (caSecret .Data [corev1 .TLSCertKey ], caSecret .Data [corev1 .TLSPrivateKeyKey ])
308
312
if err != nil {
309
- return nil , fmt .Errorf ("get ca %s/%s data failed, %v " ,
313
+ return nil , fmt .Errorf ("get ca %s/%s data failed: %w " ,
310
314
secretNamespace , customSignerConfig .SigningCA .Name , err )
311
315
}
312
316
return utils .DefaultSignerWithExpiry (caKey , caData , duration )(cluster , addon , csr )
@@ -353,10 +357,12 @@ func (a *CRDTemplateAgentAddon) TemplatePermissionConfigFunc() agent.PermissionC
353
357
return func (cluster * clusterv1.ManagedCluster , addon * addonapiv1alpha1.ManagedClusterAddOn ) error {
354
358
template , err := a .GetDesiredAddOnTemplate (addon , cluster .Name , a .addonName )
355
359
if err != nil {
356
- return err
360
+ return fmt .Errorf ("PermissionConfig failed to get addon template for addon %s/%s: %v" ,
361
+ cluster .Name , a .addonName , err )
357
362
}
358
363
if template == nil {
359
- return nil
364
+ return fmt .Errorf ("PermissionConfig failed to get addon template for addon %s/%s, template is nil" ,
365
+ cluster .Name , a .addonName )
360
366
}
361
367
362
368
for _ , registration := range template .Spec .Registration {
@@ -376,8 +382,8 @@ func (a *CRDTemplateAgentAddon) TemplatePermissionConfigFunc() agent.PermissionC
376
382
continue
377
383
378
384
default :
379
- a .logger .Info ("PermissionConfig unsupported registration type" , "cluster" , cluster . Name , "addon" , a . addonName ,
380
- "type" , registration .Type )
385
+ a .logger .Info ("PermissionConfig unsupported registration type" ,
386
+ "clusterName" , cluster . Name , "addonName" , a . addonName , " type" , registration .Type )
381
387
}
382
388
383
389
}
0 commit comments