Skip to content

Commit 1aff5d8

Browse files
add Reason suffix and fix CI
1 parent 7b9f7ef commit 1aff5d8

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

bootstrap/kubeadm/api/v1alpha3/condition_consts.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ const (
6262
// automatically recover from them.
6363
CertificatesGenerationFailedReason = "CertificatesGenerationFailed"
6464

65-
// CertificatesCorrupted (Severity=Error) documents a KubeadmConfig controller detecting
65+
// CertificatesCorruptedReason (Severity=Error) documents a KubeadmConfig controller detecting
6666
// an error while while retrieving certificates for a joining node.
67-
CertificatesCorrupted = "CertificatesCorrupted"
67+
CertificatesCorruptedReason = "CertificatesCorrupted"
6868
)

bootstrap/kubeadm/controllers/kubeadmconfig_controller.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -420,11 +420,11 @@ func (r *KubeadmConfigReconciler) joinWorker(ctx context.Context, scope *Scope)
420420
util.ObjectKey(scope.Cluster),
421421
)
422422
if err != nil {
423-
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorrupted, clusterv1.ConditionSeverityError, err.Error())
423+
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorruptedReason, clusterv1.ConditionSeverityError, err.Error())
424424
return ctrl.Result{}, err
425425
}
426426
if err := certificates.EnsureAllExist(); err != nil {
427-
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorrupted, clusterv1.ConditionSeverityError, err.Error())
427+
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorruptedReason, clusterv1.ConditionSeverityError, err.Error())
428428
return ctrl.Result{}, err
429429
}
430430
conditions.MarkTrue(scope.Config, bootstrapv1.CertificatesAvailableCondition)
@@ -501,11 +501,11 @@ func (r *KubeadmConfigReconciler) joinControlplane(ctx context.Context, scope *S
501501
util.ObjectKey(scope.Cluster),
502502
)
503503
if err != nil {
504-
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorrupted, clusterv1.ConditionSeverityError, err.Error())
504+
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorruptedReason, clusterv1.ConditionSeverityError, err.Error())
505505
return ctrl.Result{}, err
506506
}
507507
if err := certificates.EnsureAllExist(); err != nil {
508-
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorrupted, clusterv1.ConditionSeverityError, err.Error())
508+
conditions.MarkFalse(scope.Config, bootstrapv1.CertificatesAvailableCondition, bootstrapv1.CertificatesCorruptedReason, clusterv1.ConditionSeverityError, err.Error())
509509
return ctrl.Result{}, err
510510
}
511511
conditions.MarkTrue(scope.Config, bootstrapv1.CertificatesAvailableCondition)

bootstrap/kubeadm/controllers/kubeadmconfig_controller_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -423,7 +423,7 @@ func TestKubeadmConfigReconciler_Reconcile_RequeueJoiningNodesIfControlPlaneNotI
423423
g.Expect(err).NotTo(HaveOccurred())
424424
g.Expect(result.Requeue).To(BeFalse())
425425
g.Expect(result.RequeueAfter).To(Equal(30 * time.Second))
426-
assertHasFalseCondition(g, myclient, tc.request, bootstrapv1.DataSecretAvailableCondition, clusterv1.ConditionSeverityInfo, bootstrapv1.WaitingForControlPlaneInitializedReason)
426+
assertHasFalseCondition(g, myclient, tc.request, bootstrapv1.DataSecretAvailableCondition, clusterv1.ConditionSeverityInfo, bootstrapv1.WaitingForControlPlaneAvailableReason)
427427
})
428428
}
429429
}
@@ -468,7 +468,7 @@ func TestKubeadmConfigReconciler_Reconcile_GenerateCloudConfigData(t *testing.T)
468468
g.Expect(err).NotTo(HaveOccurred())
469469
g.Expect(cfg.Status.Ready).To(BeTrue())
470470
g.Expect(cfg.Status.DataSecretName).NotTo(BeNil())
471-
assertHasTrueCondition(g, myclient, request, bootstrapv1.CertificatesGeneratedCondition)
471+
assertHasTrueCondition(g, myclient, request, bootstrapv1.CertificatesAvailableCondition)
472472
assertHasTrueCondition(g, myclient, request, bootstrapv1.DataSecretAvailableCondition)
473473

474474
// Ensure that we don't fail trying to refresh any bootstrap tokens

0 commit comments

Comments
 (0)