@@ -70,49 +70,49 @@ func (r *ReconcilePerconaServerMongoDB) ensureSecretExistence(ctx context.Contex
7070
7171 if cr .Spec .Secrets .Users != "" {
7272 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .Users ); err != nil {
73- return fmt .Errorf ("users '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .Users , err )
73+ return fmt .Errorf ("users '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .Users , err )
7474 }
7575 }
7676
7777 if cr .Spec .Secrets .SSL != "" {
7878 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .SSL ); err != nil {
79- return fmt .Errorf ("ssl '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .SSL , err )
79+ return fmt .Errorf ("ssl '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .SSL , err )
8080 }
8181 }
8282
8383 if cr .Spec .Secrets .SSLInternal != "" {
8484 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .SSLInternal ); err != nil {
85- return fmt .Errorf ("ssl internal '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .SSLInternal , err )
85+ return fmt .Errorf ("ssl internal '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .SSLInternal , err )
8686 }
8787 }
8888
8989 if cr .Spec .Secrets .InternalKey != "" {
9090 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .InternalKey ); err != nil {
91- return fmt .Errorf ("internal key '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .InternalKey , err )
91+ return fmt .Errorf ("internal key '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .InternalKey , err )
9292 }
9393 }
9494
9595 if cr .Spec .Secrets .EncryptionKey != "" {
9696 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .EncryptionKey ); err != nil {
97- return fmt .Errorf ("encryption key '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .EncryptionKey , err )
97+ return fmt .Errorf ("encryption key '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .EncryptionKey , err )
9898 }
9999 }
100100
101101 if cr .Spec .Secrets .Vault != "" {
102102 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .Vault ); err != nil {
103- return fmt .Errorf ("vault '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .Vault , err )
103+ return fmt .Errorf ("vault '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .Vault , err )
104104 }
105105 }
106106
107107 if cr .Spec .Secrets .SSE != "" {
108108 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .SSE ); err != nil {
109- return fmt .Errorf ("sse '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .SSE , err )
109+ return fmt .Errorf ("sse '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .SSE , err )
110110 }
111111 }
112112
113113 if cr .Spec .Secrets .LDAPSecret != "" {
114114 if _ , err := getSecret (ctx , r .client , cr , cr .Spec .Secrets .LDAPSecret ); err != nil {
115- return fmt .Errorf ("ldap '%s' secret must exist if specified in the in the manifest: %w" , cr .Spec .Secrets .LDAPSecret , err )
115+ return fmt .Errorf ("ldap '%s' secret must exist if specified in the manifest: %w" , cr .Spec .Secrets .LDAPSecret , err )
116116 }
117117 }
118118
0 commit comments