nil secrets as recoverable to keep renew attempts

This commit is contained in:
Mahmood Ali
2018-11-20 17:11:55 -05:00
parent 118300ae33
commit 3a57b9c2fe

View File

@@ -583,15 +583,15 @@ func (v *vaultClient) renew() (bool, error) {
// Attempt to renew the token
secret, err := v.auth.RenewSelf(v.tokenData.CreationTTL)
if err != nil {
// Check if there is a permission denied
recoverable := !structs.VaultUnrecoverableError.MatchString(err.Error())
return recoverable, fmt.Errorf("failed to renew the vault token: %v", err)
}
if secret == nil {
// It's possible for RenewSelf to return (nil, nil) if the
// response body from Vault is empty.
return fmt.Errorf("renewal failed: empty response from vault")
return true, fmt.Errorf("renewal failed: empty response from vault")
}
// these treated as transient errors, where can keep renewing