diff --git a/lib/login.js b/lib/login.js index 12794449..ea78959b 100644 --- a/lib/login.js +++ b/lib/login.js @@ -31,7 +31,7 @@ function getKubeconfig() { core.debug("Found clusterUrl, creating kubeconfig using certificate and token"); let k8sSecret = core.getInput('k8s-secret', { required: true }); var parsedk8sSecret = jsyaml.safeLoad(k8sSecret); - let kubernetesServiceAccountSecretFieldNotPresent = 'The service account secret yaml does not contain data; field. Make sure that its present and try again.'; + let kubernetesServiceAccountSecretFieldNotPresent = 'The service account secret yaml does not contain %s; field. Make sure that its present and try again.'; if (!parsedk8sSecret) { throw Error("The service account secret yaml specified is invalid. Make sure that its a valid yaml and try again."); } diff --git a/src/login.ts b/src/login.ts index a94d12d6..79820c9c 100644 --- a/src/login.ts +++ b/src/login.ts @@ -21,7 +21,7 @@ export function getKubeconfig(): string { core.debug("Found clusterUrl, creating kubeconfig using certificate and token"); let k8sSecret = core.getInput('k8s-secret', { required: true }); var parsedk8sSecret = jsyaml.safeLoad(k8sSecret); - let kubernetesServiceAccountSecretFieldNotPresent = 'The service account secret yaml does not contain data; field. Make sure that its present and try again.'; + let kubernetesServiceAccountSecretFieldNotPresent = 'The service account secret yaml does not contain %s; field. Make sure that its present and try again.'; if (!parsedk8sSecret) { throw Error("The service account secret yaml specified is invalid. Make sure that its a valid yaml and try again."); }