Skip to content

Commit 30c7df5

Browse files
authored
Merge pull request kubernetes#73987 from vanduc95/cleanup-kubeadm-20190213
kubeadm cleanup: master -> control-plane
2 parents d8f0146 + 0e8941f commit 30c7df5

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

cmd/kubeadm/app/cmd/join.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ var (
6464
6565
* Certificate signing request was sent to apiserver and approval was received.
6666
* The Kubelet was informed of the new secure connection details.
67-
* Master label and taint were applied to the new node.
67+
* Control plane (master) label and taint were applied to the new node.
6868
* The Kubernetes control plane instances scaled up.
6969
{{.etcdMessage}}
7070

cmd/kubeadm/app/cmd/options/token.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ type BootstrapTokenOptions struct {
4646
func (bto *BootstrapTokenOptions) AddTokenFlag(fs *pflag.FlagSet) {
4747
fs.StringVar(
4848
&bto.TokenStr, TokenStr, "",
49-
"The token to use for establishing bidirectional trust between nodes and masters. The format is [a-z0-9]{6}\\.[a-z0-9]{16} - e.g. abcdef.0123456789abcdef",
49+
"The token to use for establishing bidirectional trust between nodes and control-plane nodes. The format is [a-z0-9]{6}\\.[a-z0-9]{16} - e.g. abcdef.0123456789abcdef",
5050
)
5151
}
5252

cmd/kubeadm/app/discovery/token/token.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ func RetrieveValidatedConfigInfo(cfg *kubeadmapi.JoinConfiguration) (*clientcmda
9393
}
9494
detachedJWSToken, ok := insecureClusterInfo.Data[bootstrapapi.JWSSignatureKeyPrefix+token.ID]
9595
if !ok || len(detachedJWSToken) == 0 {
96-
return nil, errors.Errorf("token id %q is invalid for this cluster or it has expired. Use \"kubeadm token create\" on the master node to creating a new valid token", token.ID)
96+
return nil, errors.Errorf("token id %q is invalid for this cluster or it has expired. Use \"kubeadm token create\" on the control-plane node to create a new valid token", token.ID)
9797
}
9898
if !bootstrap.DetachedTokenIsValid(detachedJWSToken, insecureKubeconfigString, token.ID, token.Secret) {
9999
return nil, errors.New("failed to verify JWS signature of received cluster info object, can't trust this API Server")

cmd/kubeadm/app/phases/upgrade/health.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,16 +109,16 @@ func masterNodesReady(client clientset.Interface) error {
109109
LabelSelector: selector.String(),
110110
})
111111
if err != nil {
112-
return errors.Wrap(err, "couldn't list masters in cluster")
112+
return errors.Wrap(err, "couldn't list control-planes in cluster")
113113
}
114114

115115
if len(masters.Items) == 0 {
116-
return errors.New("failed to find any nodes with master role")
116+
return errors.New("failed to find any nodes with a control-plane role")
117117
}
118118

119119
notReadyMasters := getNotReadyNodes(masters.Items)
120120
if len(notReadyMasters) != 0 {
121-
return errors.Errorf("there are NotReady masters in the cluster: %v", notReadyMasters)
121+
return errors.Errorf("there are NotReady control-planes in the cluster: %v", notReadyMasters)
122122
}
123123
return nil
124124
}

0 commit comments

Comments
 (0)