diff --git a/build b/build index f910b30d..5ec2d4e9 160000 --- a/build +++ b/build @@ -1 +1 @@ -Subproject commit f910b30d0cab58583479ad3a4a6754fb142ebd10 +Subproject commit 5ec2d4e989e04d5a3db0ca5e6db2def0efd254c3 diff --git a/pkg/cmd/validator/validator.go b/pkg/cmd/validator/validator.go index 05f5691b..46acad70 100644 --- a/pkg/cmd/validator/validator.go +++ b/pkg/cmd/validator/validator.go @@ -451,7 +451,7 @@ func printValidationResults(validationResults []unstructured.Unstructured) error if err != nil { return err } - log.InfoCLI(vrStr) + log.InfoCLI("%s", vrStr) } return nil } @@ -947,7 +947,7 @@ func applyValidator(c *cfg.Config, vc *components.ValidatorConfig) error { values = append(values, pluginValues...) finalValues := string(values) log.Debug("applying validator helm chart with values:") - log.Debug(finalValues) + log.Debug("%s", finalValues) // install validator helm chart @@ -962,7 +962,7 @@ func applyValidator(c *cfg.Config, vc *components.ValidatorConfig) error { if !strings.HasSuffix(strings.TrimSpace(stderr), "already exists") { return errors.Wrap(err, stderr) } - log.Debug(stderr) + log.Debug("%s", stderr) } } } diff --git a/pkg/services/env_service.go b/pkg/services/env_service.go index e22bae00..24898baf 100644 --- a/pkg/services/env_service.go +++ b/pkg/services/env_service.go @@ -258,7 +258,7 @@ func ensureDockerCACertDir(path string) error { cmd := exec.Command("sudo", "rm", "-f", path) //#nosec G204 _, stderr, err := exec_utils.Execute(true, cmd) if err != nil { - return errors.Wrapf(err, stderr) + return errors.Wrap(err, stderr) } return createDockerCACertDir(path) } @@ -269,7 +269,7 @@ func createDockerCACertDir(path string) error { cmd := exec.Command("sudo", "mkdir", "-p", path) //#nosec G204 _, stderr, err := exec_utils.Execute(true, cmd) if err != nil { - return errors.Wrapf(err, stderr) + return errors.Wrap(err, stderr) } log.InfoCLI("Created Docker OCI CA certificate directory: %s", path) return nil diff --git a/pkg/services/validator/rule_names.go b/pkg/services/validator/rule_names.go index 6416fde4..e7cac2c1 100644 --- a/pkg/services/validator/rule_names.go +++ b/pkg/services/validator/rule_names.go @@ -15,7 +15,7 @@ func initRule(rule validationrule.Interface, ruleType, message string, ruleNames if name != "" { log.InfoCLI("\nReconfiguring %s rule: %s", ruleType, name) if message != "" { - log.InfoCLI(message) + log.InfoCLI("%s", message) } *ruleNames = append(*ruleNames, name) diff --git a/pkg/utils/exec/exec.go b/pkg/utils/exec/exec.go index 32f57882..cd933356 100644 --- a/pkg/utils/exec/exec.go +++ b/pkg/utils/exec/exec.go @@ -84,7 +84,7 @@ type logWriter struct { } func (l *logWriter) Write(p []byte) (n int, err error) { - log.InfoCLI(string(p)) + log.InfoCLI("%s", string(p)) return l.buffer.Write(p) } diff --git a/pkg/utils/kube/kube.go b/pkg/utils/kube/kube.go index 601b8c3c..e6a49fa6 100644 --- a/pkg/utils/kube/kube.go +++ b/pkg/utils/kube/kube.go @@ -39,7 +39,7 @@ func KubectlCommand(params []string, kConfig string) (out, stderr string, err er log.InfoCLI("\n==== Kubectl Command ==== Create Secret") } else { log.InfoCLI("\n==== Kubectl Command ====") - log.InfoCLI(cmd.String()) + log.InfoCLI("%s", cmd.String()) } out, stderr, err = exec_utils.Execute(true, cmd)