@@ -29,14 +29,14 @@ import (
29
29
cmmeta "github.com/cert-manager/cert-manager/pkg/apis/meta/v1"
30
30
clientset "github.com/cert-manager/cert-manager/pkg/client/clientset/versioned"
31
31
cmlisters "github.com/cert-manager/cert-manager/pkg/client/listers/certmanager/v1"
32
- "github.com/golang/glog"
33
32
corev1 "k8s.io/api/core/v1"
34
33
apierrors "k8s.io/apimachinery/pkg/api/errors"
35
34
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
36
35
"k8s.io/apimachinery/pkg/labels"
37
36
"k8s.io/apimachinery/pkg/runtime/schema"
38
37
"k8s.io/client-go/tools/record"
39
38
39
+ nl "github.com/nginxinc/kubernetes-ingress/internal/logger"
40
40
vsapi "github.com/nginxinc/kubernetes-ingress/pkg/apis/configuration/v1"
41
41
)
42
42
@@ -67,19 +67,20 @@ func SyncFnFor(
67
67
if vs .Spec .TLS == nil || vs .Spec .TLS .CertManager == nil {
68
68
return nil
69
69
}
70
+ l := nl .LoggerFromContext (ctx )
70
71
issuerName , issuerKind , issuerGroup , err := issuerForVirtualServer (vs )
71
72
if err != nil {
72
- glog .Errorf ("Failed to determine issuer to be used for VirtualServer resource: %v" , err )
73
+ nl .Errorf (l , "Failed to determine issuer to be used for VirtualServer resource: %v" , err )
73
74
rec .Eventf (vs , corev1 .EventTypeWarning , reasonBadConfig , "Could not determine issuer for virtual server due to bad config: %s" ,
74
75
err )
75
76
return err
76
77
}
77
78
78
79
nsi := getNamespacedInformer (vs .GetNamespace (), ig )
79
80
80
- newCrts , updateCrts , err := buildCertificates (nsi .cmLister , vs , issuerName , issuerKind , issuerGroup )
81
+ newCrts , updateCrts , err := buildCertificates (ctx , nsi .cmLister , vs , issuerName , issuerKind , issuerGroup )
81
82
if err != nil {
82
- glog .Errorf ("Incorrect cert-manager configuration for VirtualServer resource: %v" , err )
83
+ nl .Errorf (l , "Incorrect cert-manager configuration for VirtualServer resource: %v" , err )
83
84
rec .Eventf (vs , corev1 .EventTypeWarning , reasonBadConfig , "Incorrect cert-manager configuration for VirtualServer resource: %s" ,
84
85
err )
85
86
return err
@@ -88,7 +89,7 @@ func SyncFnFor(
88
89
for _ , crt := range newCrts {
89
90
_ , err := cmClient .CertmanagerV1 ().Certificates (crt .Namespace ).Create (ctx , crt , metav1.CreateOptions {})
90
91
if err != nil {
91
- glog .Errorf ("Error issuing Certificate for VirtualServer resource: %v" , err )
92
+ nl .Errorf (l , "Error issuing Certificate for VirtualServer resource: %v" , err )
92
93
rec .Eventf (vs , corev1 .EventTypeWarning , reasonBadConfig , "Error issuing Certificate for VirtualServer resource: %s" ,
93
94
err )
94
95
return err
@@ -99,7 +100,7 @@ func SyncFnFor(
99
100
for _ , crt := range updateCrts {
100
101
_ , err := cmClient .CertmanagerV1 ().Certificates (crt .Namespace ).Update (ctx , crt , metav1.UpdateOptions {})
101
102
if err != nil {
102
- glog .Errorf ("Error updating Certificate for VirtualServer resource: %v" , err )
103
+ nl .Errorf (l , "Error updating Certificate for VirtualServer resource: %v" , err )
103
104
rec .Eventf (vs , corev1 .EventTypeWarning , reasonBadConfig , "Error updating Certificate for VirtualServer resource: %s" ,
104
105
err )
105
106
return err
@@ -117,7 +118,7 @@ func SyncFnFor(
117
118
for _ , certName := range unrequiredCertNames {
118
119
err = cmClient .CertmanagerV1 ().Certificates (vs .GetNamespace ()).Delete (ctx , certName , metav1.DeleteOptions {})
119
120
if err != nil {
120
- glog .Errorf ("Error deleting Certificate for VirtualServer resource: %v" , err )
121
+ nl .Errorf (l , "Error deleting Certificate for VirtualServer resource: %v" , err )
121
122
return err
122
123
}
123
124
rec .Eventf (vs , corev1 .EventTypeNormal , reasonDeleteCertificate , "Successfully deleted unrequired Certificate %q" , certName )
@@ -128,6 +129,7 @@ func SyncFnFor(
128
129
}
129
130
130
131
func buildCertificates (
132
+ ctx context.Context ,
131
133
cmLister cmlisters.CertificateLister ,
132
134
vs * vsapi.VirtualServer ,
133
135
issuerName , issuerKind , issuerGroup string ,
@@ -165,6 +167,8 @@ func buildCertificates(
165
167
},
166
168
}
167
169
170
+ l := nl .LoggerFromContext (ctx )
171
+
168
172
vs = vs .DeepCopy ()
169
173
170
174
if err := translateVsSpec (crt , vs .Spec .TLS .CertManager ); err != nil {
@@ -174,20 +178,20 @@ func buildCertificates(
174
178
// check if a Certificate for this TLS entry already exists, and if it
175
179
// does then skip this entry
176
180
if existingCrt != nil {
177
- glog . V ( 3 ). Infof ( "certificate already exists for this object, ensuring it is up to date" )
181
+ nl . Debugf ( l , "certificate already exists for this object, ensuring it is up to date" )
178
182
179
183
if metav1 .GetControllerOf (existingCrt ) == nil {
180
- glog . V ( 3 ). Infof ( "certificate resource has no owner. refusing to update non-owned certificate resource for object" )
184
+ nl . Debugf ( l , "certificate resource has no owner. refusing to update non-owned certificate resource for object" )
181
185
return nil , nil , nil
182
186
}
183
187
184
188
if ! metav1 .IsControlledBy (existingCrt , vs ) {
185
- glog . V ( 3 ). Infof ( "certificate resource is not owned by this object. refusing to update non-owned certificate resource for object" )
189
+ nl . Debugf ( l , "certificate resource is not owned by this object. refusing to update non-owned certificate resource for object" )
186
190
return nil , nil , nil
187
191
}
188
192
189
193
if ! certNeedsUpdate (existingCrt , crt ) {
190
- glog . V ( 3 ). Infof ( "certificate resource is already up to date for object" )
194
+ nl . Debugf ( l , "certificate resource is already up to date for object" )
191
195
return nil , nil , nil
192
196
}
193
197
0 commit comments