@@ -20,7 +20,7 @@ import (
20
20
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
21
21
"github.com/benbjohnson/clock"
22
22
"github.com/go-logr/logr"
23
- "github.com/pkg/errors "
23
+ "github.com/rotisserie/eris "
24
24
"golang.org/x/time/rate"
25
25
apiextensions "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
26
26
"k8s.io/apimachinery/pkg/runtime"
@@ -151,7 +151,7 @@ func SetupControllerManager(ctx context.Context, setupLog logr.Logger, flgs *Fla
151
151
152
152
included := crdmanagement .IncludedCRDs (installationInstructions )
153
153
if len (included ) == 0 {
154
- err = errors .New ("No existing CRDs in cluster and no --crd-pattern specified" )
154
+ err = eris .New ("No existing CRDs in cluster and no --crd-pattern specified" )
155
155
setupLog .Error (err , "failed to apply CRDs" )
156
156
os .Exit (1 )
157
157
}
@@ -297,7 +297,7 @@ func getDefaultAzureTokenCredential(cfg config.Values, setupLog logr.Logger) (az
297
297
TokenFilePath : identity .FederatedTokenFilePath ,
298
298
})
299
299
if err != nil {
300
- return nil , errors .Wrapf (err , "unable to get workload identity credential" )
300
+ return nil , eris .Wrapf (err , "unable to get workload identity credential" )
301
301
}
302
302
303
303
return credential , nil
@@ -307,15 +307,15 @@ func getDefaultAzureTokenCredential(cfg config.Values, setupLog logr.Logger) (az
307
307
certPassword := os .Getenv (common .AzureClientCertificatePassword )
308
308
credential , err := identity .NewClientCertificateCredential (cfg .TenantID , cfg .ClientID , []byte (cert ), []byte (certPassword ))
309
309
if err != nil {
310
- return nil , errors .Wrapf (err , "unable to get client certificate credential" )
310
+ return nil , eris .Wrapf (err , "unable to get client certificate credential" )
311
311
}
312
312
313
313
return credential , nil
314
314
}
315
315
316
316
credential , err := azidentity .NewDefaultAzureCredential (nil )
317
317
if err != nil {
318
- return nil , errors .Wrapf (err , "unable to get default azure credential" )
318
+ return nil , eris .Wrapf (err , "unable to get default azure credential" )
319
319
}
320
320
321
321
return credential , err
@@ -340,7 +340,7 @@ func initializeClients(cfg config.Values, mgr ctrl.Manager) (*clients, error) {
340
340
341
341
credential , err := getDefaultAzureCredential (cfg , log )
342
342
if err != nil {
343
- return nil , errors .Wrap (err , "error while fetching default global credential" )
343
+ return nil , eris .Wrap (err , "error while fetching default global credential" )
344
344
}
345
345
346
346
kubeClient := kubeclient .NewClient (mgr .GetClient ())
@@ -366,7 +366,7 @@ func initializeClients(cfg config.Values, mgr ctrl.Manager) (*clients, error) {
366
366
asocel .Log (log ),
367
367
)
368
368
if err != nil {
369
- return nil , errors .Wrap (err , "error creating expression evaluator" )
369
+ return nil , eris .Wrap (err , "error creating expression evaluator" )
370
370
}
371
371
// Register the evaluator for use by webhooks
372
372
asocel .RegisterEvaluator (expressionEvaluator )
@@ -396,13 +396,13 @@ func initializeWatchers(readyResources map[string]apiextensions.CustomResourceDe
396
396
clients .expressionEvaluator ,
397
397
clients .options )
398
398
if err != nil {
399
- return errors .Wrap (err , "failed getting storage types and reconcilers" )
399
+ return eris .Wrap (err , "failed getting storage types and reconcilers" )
400
400
}
401
401
402
402
// Filter the types to register
403
403
objs , err = crdmanagement .FilterStorageTypesByReadyCRDs (clients .log , mgr .GetScheme (), readyResources , objs )
404
404
if err != nil {
405
- return errors .Wrap (err , "failed to filter storage types by ready CRDs" )
405
+ return eris .Wrap (err , "failed to filter storage types by ready CRDs" )
406
406
}
407
407
408
408
err = generic .RegisterAll (
@@ -413,7 +413,7 @@ func initializeWatchers(readyResources map[string]apiextensions.CustomResourceDe
413
413
objs ,
414
414
clients .options )
415
415
if err != nil {
416
- return errors .Wrap (err , "failed to register gvks" )
416
+ return eris .Wrap (err , "failed to register gvks" )
417
417
}
418
418
419
419
return nil
@@ -463,7 +463,7 @@ func newCRDManager(logger logr.Logger, k8sConfig *rest.Config) (*crdmanagement.M
463
463
_ = apiextensions .AddToScheme (crdScheme )
464
464
crdClient , err := client .New (k8sConfig , client.Options {Scheme : crdScheme })
465
465
if err != nil {
466
- return nil , errors .Wrap (err , "unable to create CRD client" )
466
+ return nil , eris .Wrap (err , "unable to create CRD client" )
467
467
}
468
468
469
469
crdManager := crdmanagement .NewManager (logger , kubeclient .NewClient (crdClient ))
0 commit comments