@@ -120,7 +120,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
120
120
}
121
121
122
122
// Stop reconciliation as the item is being deleted
123
- r .Log .Info (fmt .Sprintf ("Secret %s deleted" , secret .Name ))
123
+ r .Log .Info (fmt .Sprintf ("Secret %s/%s deleted" , secret . Namespace , secret .Name ))
124
124
dmetrics .SecretInfo .WithLabelValues (secret .Name , secret .Namespace ).Set (0 )
125
125
return ctrl.Result {}, nil
126
126
}
@@ -200,7 +200,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
200
200
t , err := template .New (k ).Funcs (sprig .FuncMap ()).Parse (v )
201
201
if err != nil {
202
202
dmetrics .SecretError .WithLabelValues (secret .Name , secret .Namespace ).SetToCurrentTime ()
203
- r .Log .Error (err , "Cannot parse template" )
203
+ r .Log .Error (err , "Cannot parse template" , "name" , secret . Name , "namespace" , secret . Namespace )
204
204
if r .recordingEnabled (& secret ) {
205
205
msg := fmt .Sprintf ("Template could not be parsed: %v" , err )
206
206
r .Recorder .Event (& secret , corev1 .EventTypeNormal , "Failed" , msg )
@@ -209,7 +209,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
209
209
}
210
210
if err := t .Execute (b , & dataStr ); err != nil {
211
211
dmetrics .SecretError .WithLabelValues (secret .Name , secret .Namespace ).SetToCurrentTime ()
212
- r .Log .Error (err , "Cannot render template" )
212
+ r .Log .Error (err , "Cannot render template" , "name" , secret . Name , "namespace" , secret . Namespace )
213
213
if r .recordingEnabled (& secret ) {
214
214
msg := fmt .Sprintf ("Template could not be rendered: %v" , err )
215
215
r .Recorder .Event (& secret , corev1 .EventTypeNormal , "Failed" , msg )
@@ -222,7 +222,7 @@ func (r *ValsSecretReconciler) Reconcile(ctx context.Context, req ctrl.Request)
222
222
223
223
err = r .upsertSecret (& secret , data )
224
224
if err != nil {
225
- r .Log .Error (err , "Failed to create secret" )
225
+ r .Log .Error (err , "Failed to create secret" , "name" , secret . Name , "namespace" , secret . Namespace )
226
226
return ctrl.Result {}, nil
227
227
}
228
228
elapsedProcess := time .Since (start ).Milliseconds () // Calculate the elapsed time
@@ -309,7 +309,7 @@ func (r *ValsSecretReconciler) upsertSecret(sDef *secretv1.ValsSecret, data map[
309
309
310
310
if err != nil {
311
311
if r .recordingEnabled (sDef ) {
312
- msg := fmt .Sprintf ("Secret %s not saved %v" , secret .Name , err )
312
+ msg := fmt .Sprintf ("Secret %s/%s not saved %v" , secret . Namespace , secret .Name , err )
313
313
r .Recorder .Event (sDef , corev1 .EventTypeNormal , "Failed" , msg )
314
314
}
315
315
dmetrics .SecretFailures .Inc ()
@@ -323,7 +323,7 @@ func (r *ValsSecretReconciler) upsertSecret(sDef *secretv1.ValsSecret, data map[
323
323
if r .recordingEnabled (sDef ) {
324
324
r .Recorder .Event (sDef , corev1 .EventTypeNormal , "Updated" , "Secret created or updated" )
325
325
}
326
- r .Log .Info ("Updated secret" , "name" , secretName )
326
+ r .Log .Info ("Updated secret" , "name" , secretName , "namespace" , secret . Namespace )
327
327
328
328
if len (sDef .Spec .Databases ) > 0 {
329
329
r .updateDatabases (sDef , secret )
@@ -376,7 +376,7 @@ func (r *ValsSecretReconciler) updateDatabases(sDef *secretv1.ValsSecret, secret
376
376
Port : sDef .Spec .Databases [db ].Port ,
377
377
}
378
378
if err := valsDb .UpdateUserPassword (dbQuery ); err != nil {
379
- r .Log .Error (err , "Cannot update DB password" )
379
+ r .Log .Error (err , "Cannot update DB password" , "name" , secret . Name , "namespace" , secret . Namespace )
380
380
if r .recordingEnabled (sDef ) {
381
381
r .Recorder .Event (sDef , corev1 .EventTypeNormal , "Failed" , "Cannot update database password" )
382
382
}
@@ -430,7 +430,7 @@ func (r *ValsSecretReconciler) getKeyFromK8sSecret(secretRef string) (string, er
430
430
matchMap := utils .FindAllGroups (re , secretRef )
431
431
432
432
if ! utils .K8sSecretFound (matchMap ) {
433
- return "" , fmt .Errorf ("The ref+k8s secret '%s' did not match the regular expression for ref+k8s://namespace/secret-name#key" , secretRef )
433
+ return "" , fmt .Errorf ("the ref+k8s secret '%s' did not match the regular expression for ref+k8s://namespace/secret-name#key" , secretRef )
434
434
}
435
435
secret , err := r .getSecret (matchMap ["secretName" ], matchMap ["namespace" ])
436
436
if err != nil {
0 commit comments