From 08cfbf64e45b9ac4ad4ab754bccd5ba38cc73651 Mon Sep 17 00:00:00 2001 From: Daniel Hougaard <62331820+DanielHougaard@users.noreply.github.com> Date: Thu, 21 Mar 2024 19:37:12 +0100 Subject: [PATCH] Fix: Error handing --- k8-operator/controllers/infisicalsecret_helper.go | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/k8-operator/controllers/infisicalsecret_helper.go b/k8-operator/controllers/infisicalsecret_helper.go index dc77525a07..37d13592ad 100644 --- a/k8-operator/controllers/infisicalsecret_helper.go +++ b/k8-operator/controllers/infisicalsecret_helper.go @@ -327,17 +327,16 @@ func (r *InfisicalSecretReconciler) ReconcileInfisicalSecret(ctx context.Context accessToken, err := util.MachineIdentityTokenInstance.GetToken() if err != nil { - fmt.Println("\nReconcileInfisicalSecret: Waiting for access token to become available") - return nil + return fmt.Errorf("%s", "Waiting for access token to become available") } - scope := infisicalSecret.Spec.Authentication.UniversalAuth.SecretsScope plainTextSecretsFromApi, updateAttributes, err = util.GetPlainTextSecretsViaUniversalAuth(accessToken, secretVersionBasedOnETag, scope) - fmt.Println("ReconcileInfisicalSecret: Fetched secrets via universal auth") if err != nil { return fmt.Errorf("\nfailed to get secrets because [err=%v]", err) } + fmt.Println("ReconcileInfisicalSecret: Fetched secrets via universal auth") + } else { return fmt.Errorf("no authentication method provided. You must provide either a valid service token or a service account details to fetch secrets") }