@@ -88,13 +88,13 @@ func (r *Resources) EnsureSecrets(ctx context.Context, cachedStatus inspectorInt
8888 if spec .IsAuthenticated () {
8989 counterMetric .Inc ()
9090 if err := reconcileRequired .WithError (r .ensureTokenSecret (ctx , cachedStatus , secrets , spec .Authentication .GetJWTSecretName ())); err != nil {
91- return errors .WithStack (err )
91+ return errors .Section (err , "JWT Secret" )
9292 }
9393 }
9494 if spec .IsSecure () {
9595 counterMetric .Inc ()
9696 if err := reconcileRequired .WithError (r .ensureTLSCACertificateSecret (ctx , cachedStatus , secrets , spec .TLS )); err != nil {
97- return errors .WithStack (err )
97+ return errors .Section (err , "TLS CA" )
9898 }
9999 }
100100
@@ -106,26 +106,26 @@ func (r *Resources) EnsureSecrets(ctx context.Context, cachedStatus inspectorInt
106106 if imageFound {
107107 if pod .VersionHasJWTSecretKeyfolder (image .ArangoDBVersion , image .Enterprise ) {
108108 if err := r .ensureTokenSecretFolder (ctx , cachedStatus , secrets , spec .Authentication .GetJWTSecretName (), pod .JWTSecretFolder (deploymentName )); err != nil {
109- return errors .WithStack (err )
109+ return errors .Section (err , "JWT Folder" )
110110 }
111111 }
112112 }
113113
114114 if spec .Metrics .IsEnabled () {
115115 if imageFound && pod .VersionHasJWTSecretKeyfolder (image .ArangoDBVersion , image .Enterprise ) {
116116 if err := reconcileRequired .WithError (r .ensureExporterTokenSecret (ctx , cachedStatus , secrets , spec .Metrics .GetJWTTokenSecretName (), pod .JWTSecretFolder (deploymentName ))); err != nil {
117- return errors .WithStack (err )
117+ return errors .Section (err , "Metrics JWT" )
118118 }
119119 } else {
120120 if err := reconcileRequired .WithError (r .ensureExporterTokenSecret (ctx , cachedStatus , secrets , spec .Metrics .GetJWTTokenSecretName (), spec .Authentication .GetJWTSecretName ())); err != nil {
121- return errors .WithStack (err )
121+ return errors .Section (err , "Metrics JWT" )
122122 }
123123 }
124124 }
125125 }
126126 if spec .IsSecure () {
127127 if err := reconcileRequired .WithError (r .ensureSecretWithEmptyKey (ctx , cachedStatus , secrets , GetCASecretName (r .context .GetAPIObject ()), "empty" )); err != nil {
128- return errors .WithStack (err )
128+ return errors .Section (err , "TLS TrustStore" )
129129 }
130130
131131 if err := reconcileRequired .ParallelAll (len (members ), func (id int ) error {
@@ -160,32 +160,32 @@ func (r *Resources) EnsureSecrets(ctx context.Context, cachedStatus inspectorInt
160160 }
161161 return nil
162162 }); err != nil {
163- return errors .WithStack (err )
163+ return errors .Section (err , "TLS TrustStore" )
164164 }
165165 }
166166 if spec .RocksDB .IsEncrypted () {
167167 if i := status .CurrentImage ; i != nil && features .EncryptionRotation ().Supported (i .ArangoDBVersion , i .Enterprise ) {
168168 if err := reconcileRequired .WithError (r .ensureEncryptionKeyfolderSecret (ctx , cachedStatus , secrets , spec .RocksDB .Encryption .GetKeySecretName (), pod .GetEncryptionFolderSecretName (deploymentName ))); err != nil {
169- return errors .WithStack (err )
169+ return errors .Section (err , "Encryption" )
170170 }
171171 }
172172 }
173173 if spec .Sync .IsEnabled () {
174174 counterMetric .Inc ()
175175 if err := reconcileRequired .WithError (r .ensureTokenSecret (ctx , cachedStatus , secrets , spec .Sync .Authentication .GetJWTSecretName ())); err != nil {
176- return errors .WithStack (err )
176+ return errors .Section (err , "Sync Auth" )
177177 }
178178 counterMetric .Inc ()
179179 if err := reconcileRequired .WithError (r .ensureTokenSecret (ctx , cachedStatus , secrets , spec .Sync .Monitoring .GetTokenSecretName ())); err != nil {
180- return errors .WithStack (err )
180+ return errors .Section (err , "Sync Monitoring Auth" )
181181 }
182182 counterMetric .Inc ()
183183 if err := reconcileRequired .WithError (r .ensureTLSCACertificateSecret (ctx , cachedStatus , secrets , spec .Sync .TLS )); err != nil {
184- return errors .WithStack (err )
184+ return errors .Section (err , "Sync TLS CA" )
185185 }
186186 counterMetric .Inc ()
187187 if err := reconcileRequired .WithError (r .ensureClientAuthCACertificateSecret (ctx , cachedStatus , secrets , spec .Sync .Authentication )); err != nil {
188- return errors .WithStack (err )
188+ return errors .Section (err , "Sync TLS Client CA" )
189189 }
190190 }
191191 return reconcileRequired .Reconcile (ctx )
@@ -321,7 +321,7 @@ func (r *Resources) createSecretWithMod(ctx context.Context, secrets secretv1.Mo
321321
322322 err := globals .GetGlobalTimeouts ().Kubernetes ().RunWithTimeout (ctx , func (ctxChild context.Context ) error {
323323 _ , err := secrets .Create (ctxChild , secret , meta.CreateOptions {})
324- return err
324+ return kerrors . NewResourceError ( err , secret )
325325 })
326326 if err != nil {
327327 // Failed to create secret
@@ -412,7 +412,7 @@ func AppendKeyfileToKeyfolder(ctx context.Context, cachedStatus inspectorInterfa
412412 k8sutil .AddOwnerRefToObject (secret , ownerRef )
413413 if _ , err := secrets .Create (ctx , secret , meta.CreateOptions {}); err != nil {
414414 // Failed to create secret
415- return errors . WithStack (err )
415+ return kerrors . NewResourceError (err , secret )
416416 }
417417
418418 return errors .Reconcile ()
0 commit comments