mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 05:27:21 +00:00
fix: wrap errors correct when validating kubeconfig
This allows to check for specific errors using `errors.Is`. Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
This commit is contained in:
parent
63e7ee43bb
commit
a5647fa417
@ -229,7 +229,7 @@ func validateClusterInfo(clusterName string, clusterInfo clientcmdapi.Cluster) [
|
|||||||
}
|
}
|
||||||
if proxyURL := clusterInfo.ProxyURL; proxyURL != "" {
|
if proxyURL := clusterInfo.ProxyURL; proxyURL != "" {
|
||||||
if _, err := parseProxyURL(proxyURL); err != nil {
|
if _, err := parseProxyURL(proxyURL); err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("invalid 'proxy-url' %q for cluster %q: %v", proxyURL, clusterName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("invalid 'proxy-url' %q for cluster %q: %w", proxyURL, clusterName, err))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// Make sure CA data and CA file aren't both specified
|
// Make sure CA data and CA file aren't both specified
|
||||||
@ -239,7 +239,7 @@ func validateClusterInfo(clusterName string, clusterInfo clientcmdapi.Cluster) [
|
|||||||
if len(clusterInfo.CertificateAuthority) != 0 {
|
if len(clusterInfo.CertificateAuthority) != 0 {
|
||||||
clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
|
clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read certificate-authority %v for %v due to %v", clusterInfo.CertificateAuthority, clusterName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read certificate-authority %v for %v due to %w", clusterInfo.CertificateAuthority, clusterName, err))
|
||||||
} else {
|
} else {
|
||||||
defer clientCertCA.Close()
|
defer clientCertCA.Close()
|
||||||
}
|
}
|
||||||
@ -278,7 +278,7 @@ func validateAuthInfo(authInfoName string, authInfo clientcmdapi.AuthInfo) []err
|
|||||||
if len(authInfo.ClientCertificate) != 0 {
|
if len(authInfo.ClientCertificate) != 0 {
|
||||||
clientCertFile, err := os.Open(authInfo.ClientCertificate)
|
clientCertFile, err := os.Open(authInfo.ClientCertificate)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-cert %v for %v due to %v", authInfo.ClientCertificate, authInfoName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-cert %v for %v due to %w", authInfo.ClientCertificate, authInfoName, err))
|
||||||
} else {
|
} else {
|
||||||
defer clientCertFile.Close()
|
defer clientCertFile.Close()
|
||||||
}
|
}
|
||||||
@ -286,7 +286,7 @@ func validateAuthInfo(authInfoName string, authInfo clientcmdapi.AuthInfo) []err
|
|||||||
if len(authInfo.ClientKey) != 0 {
|
if len(authInfo.ClientKey) != 0 {
|
||||||
clientKeyFile, err := os.Open(authInfo.ClientKey)
|
clientKeyFile, err := os.Open(authInfo.ClientKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-key %v for %v due to %v", authInfo.ClientKey, authInfoName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-key %v for %v due to %w", authInfo.ClientKey, authInfoName, err))
|
||||||
} else {
|
} else {
|
||||||
defer clientKeyFile.Close()
|
defer clientKeyFile.Close()
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user