Skip to content

Commit f034346

Browse files
authored
refactor: replace glog in externaldns & certmanager (#6586)
1 parent 3253295 commit f034346

File tree

6 files changed

+77
-58
lines changed

6 files changed

+77
-58
lines changed

internal/certmanager/cm_controller.go

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ import (
2626
cm_informers "github.com/cert-manager/cert-manager/pkg/client/informers/externalversions"
2727
cmlisters "github.com/cert-manager/cert-manager/pkg/client/listers/certmanager/v1"
2828
controllerpkg "github.com/cert-manager/cert-manager/pkg/controller"
29-
"github.com/golang/glog"
3029
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3130
"k8s.io/apimachinery/pkg/util/runtime"
3231
kubeinformers "k8s.io/client-go/informers"
@@ -36,6 +35,7 @@ import (
3635
"k8s.io/client-go/tools/record"
3736
"k8s.io/client-go/util/workqueue"
3837

38+
nl "github.com/nginxinc/kubernetes-ingress/internal/logger"
3939
conf_v1 "github.com/nginxinc/kubernetes-ingress/pkg/apis/configuration/v1"
4040
k8s_nginx "github.com/nginxinc/kubernetes-ingress/pkg/client/clientset/versioned"
4141
vsinformers "github.com/nginxinc/kubernetes-ingress/pkg/client/informers/externalversions"
@@ -136,7 +136,8 @@ func (c *CmController) addHandlers(nsi *namespacedInformer) {
136136
}
137137

138138
func (c *CmController) processItem(ctx context.Context, key string) error {
139-
glog.V(3).Infof("processing virtual server resource ")
139+
l := nl.LoggerFromContext(ctx)
140+
nl.Debugf(l, "processing virtual server resource ")
140141
namespace, name, err := cache.SplitMetaNamespaceKey(key)
141142
if err != nil {
142143
runtime.HandleError(fmt.Errorf("invalid resource key: %s", key))
@@ -236,7 +237,9 @@ func (c *CmController) Run(stopCh <-chan struct{}) {
236237
ctx, cancel := context.WithCancel(c.ctx)
237238
defer cancel()
238239

239-
glog.Infof("Starting cert-manager control loop")
240+
l := nl.LoggerFromContext(ctx)
241+
242+
nl.Info(l, "Starting cert-manager control loop")
240243

241244
var mustSync []cache.InformerSynced
242245
for _, ig := range c.informerGroup {
@@ -245,17 +248,17 @@ func (c *CmController) Run(stopCh <-chan struct{}) {
245248
}
246249
// wait for all the informer caches we depend on are synced
247250

248-
glog.V(3).Infof("Waiting for %d caches to sync", len(mustSync))
251+
nl.Debugf(l, "Waiting for %d caches to sync", len(mustSync))
249252
if !cache.WaitForNamedCacheSync(ControllerName, stopCh, mustSync...) {
250-
glog.Fatal("error syncing cm queue")
253+
nl.Fatal(l, "error syncing cm queue")
251254
}
252255

253-
glog.V(3).Infof("Queue is %v", c.queue.Len())
256+
nl.Debugf(l, "Queue is %v", c.queue.Len())
254257

255258
go c.runWorker(ctx)
256259

257260
<-stopCh
258-
glog.V(3).Infof("shutting down queue as workqueue signaled shutdown")
261+
nl.Debugf(l, "shutting down queue as workqueue signaled shutdown")
259262
for _, ig := range c.informerGroup {
260263
ig.stop()
261264
}
@@ -276,7 +279,8 @@ func (nsi *namespacedInformer) stop() {
276279
// processItem function in order to read and process a message on the
277280
// workqueue.
278281
func (c *CmController) runWorker(ctx context.Context) {
279-
glog.V(3).Infof("processing items on the workqueue")
282+
l := nl.LoggerFromContext(ctx)
283+
nl.Debugf(l, "processing items on the workqueue")
280284
for {
281285
obj, shutdown := c.queue.Get()
282286
if shutdown {
@@ -294,19 +298,20 @@ func (c *CmController) runWorker(ctx context.Context) {
294298

295299
err := c.processItem(ctx, key)
296300
if err != nil {
297-
glog.V(3).Infof("Re-queuing item due to error processing: %v", err)
301+
nl.Debugf(l, "Re-queuing item due to error processing: %v", err)
298302
c.queue.AddRateLimited(obj)
299303
return
300304
}
301-
glog.V(3).Infof("finished processing work item")
305+
nl.Debugf(l, "finished processing work item")
302306
c.queue.Forget(obj)
303307
}()
304308
}
305309
}
306310

307311
// AddNewNamespacedInformer adds watchers for a new namespace
308312
func (c *CmController) AddNewNamespacedInformer(ns string) {
309-
glog.V(3).Infof("Adding or Updating cert-manager Watchers for Namespace: %v", ns)
313+
l := nl.LoggerFromContext(c.ctx)
314+
nl.Debugf(l, "Adding or Updating cert-manager Watchers for Namespace: %v", ns)
310315
nsi := getNamespacedInformer(ns, c.informerGroup)
311316
if nsi == nil {
312317
nsi = c.newNamespacedInformer(ns)
@@ -319,7 +324,8 @@ func (c *CmController) AddNewNamespacedInformer(ns string) {
319324

320325
// RemoveNamespacedInformer removes watchers for a namespace we are no longer watching
321326
func (c *CmController) RemoveNamespacedInformer(ns string) {
322-
glog.V(3).Infof("Deleting cert-manager Watchers for Deleted Namespace: %v", ns)
327+
l := nl.LoggerFromContext(c.ctx)
328+
nl.Debugf(l, "Deleting cert-manager Watchers for Deleted Namespace: %v", ns)
323329
nsi := getNamespacedInformer(ns, c.informerGroup)
324330
if nsi != nil {
325331
nsi.lock.Lock()

internal/certmanager/sync.go

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ import (
2929
cmmeta "github.com/cert-manager/cert-manager/pkg/apis/meta/v1"
3030
clientset "github.com/cert-manager/cert-manager/pkg/client/clientset/versioned"
3131
cmlisters "github.com/cert-manager/cert-manager/pkg/client/listers/certmanager/v1"
32-
"github.com/golang/glog"
3332
corev1 "k8s.io/api/core/v1"
3433
apierrors "k8s.io/apimachinery/pkg/api/errors"
3534
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3635
"k8s.io/apimachinery/pkg/labels"
3736
"k8s.io/apimachinery/pkg/runtime/schema"
3837
"k8s.io/client-go/tools/record"
3938

39+
nl "github.com/nginxinc/kubernetes-ingress/internal/logger"
4040
vsapi "github.com/nginxinc/kubernetes-ingress/pkg/apis/configuration/v1"
4141
)
4242

@@ -67,19 +67,20 @@ func SyncFnFor(
6767
if vs.Spec.TLS == nil || vs.Spec.TLS.CertManager == nil {
6868
return nil
6969
}
70+
l := nl.LoggerFromContext(ctx)
7071
issuerName, issuerKind, issuerGroup, err := issuerForVirtualServer(vs)
7172
if err != nil {
72-
glog.Errorf("Failed to determine issuer to be used for VirtualServer resource: %v", err)
73+
nl.Errorf(l, "Failed to determine issuer to be used for VirtualServer resource: %v", err)
7374
rec.Eventf(vs, corev1.EventTypeWarning, reasonBadConfig, "Could not determine issuer for virtual server due to bad config: %s",
7475
err)
7576
return err
7677
}
7778

7879
nsi := getNamespacedInformer(vs.GetNamespace(), ig)
7980

80-
newCrts, updateCrts, err := buildCertificates(nsi.cmLister, vs, issuerName, issuerKind, issuerGroup)
81+
newCrts, updateCrts, err := buildCertificates(ctx, nsi.cmLister, vs, issuerName, issuerKind, issuerGroup)
8182
if err != nil {
82-
glog.Errorf("Incorrect cert-manager configuration for VirtualServer resource: %v", err)
83+
nl.Errorf(l, "Incorrect cert-manager configuration for VirtualServer resource: %v", err)
8384
rec.Eventf(vs, corev1.EventTypeWarning, reasonBadConfig, "Incorrect cert-manager configuration for VirtualServer resource: %s",
8485
err)
8586
return err
@@ -88,7 +89,7 @@ func SyncFnFor(
8889
for _, crt := range newCrts {
8990
_, err := cmClient.CertmanagerV1().Certificates(crt.Namespace).Create(ctx, crt, metav1.CreateOptions{})
9091
if err != nil {
91-
glog.Errorf("Error issuing Certificate for VirtualServer resource: %v", err)
92+
nl.Errorf(l, "Error issuing Certificate for VirtualServer resource: %v", err)
9293
rec.Eventf(vs, corev1.EventTypeWarning, reasonBadConfig, "Error issuing Certificate for VirtualServer resource: %s",
9394
err)
9495
return err
@@ -99,7 +100,7 @@ func SyncFnFor(
99100
for _, crt := range updateCrts {
100101
_, err := cmClient.CertmanagerV1().Certificates(crt.Namespace).Update(ctx, crt, metav1.UpdateOptions{})
101102
if err != nil {
102-
glog.Errorf("Error updating Certificate for VirtualServer resource: %v", err)
103+
nl.Errorf(l, "Error updating Certificate for VirtualServer resource: %v", err)
103104
rec.Eventf(vs, corev1.EventTypeWarning, reasonBadConfig, "Error updating Certificate for VirtualServer resource: %s",
104105
err)
105106
return err
@@ -117,7 +118,7 @@ func SyncFnFor(
117118
for _, certName := range unrequiredCertNames {
118119
err = cmClient.CertmanagerV1().Certificates(vs.GetNamespace()).Delete(ctx, certName, metav1.DeleteOptions{})
119120
if err != nil {
120-
glog.Errorf("Error deleting Certificate for VirtualServer resource: %v", err)
121+
nl.Errorf(l, "Error deleting Certificate for VirtualServer resource: %v", err)
121122
return err
122123
}
123124
rec.Eventf(vs, corev1.EventTypeNormal, reasonDeleteCertificate, "Successfully deleted unrequired Certificate %q", certName)
@@ -128,6 +129,7 @@ func SyncFnFor(
128129
}
129130

130131
func buildCertificates(
132+
ctx context.Context,
131133
cmLister cmlisters.CertificateLister,
132134
vs *vsapi.VirtualServer,
133135
issuerName, issuerKind, issuerGroup string,
@@ -165,6 +167,8 @@ func buildCertificates(
165167
},
166168
}
167169

170+
l := nl.LoggerFromContext(ctx)
171+
168172
vs = vs.DeepCopy()
169173

170174
if err := translateVsSpec(crt, vs.Spec.TLS.CertManager); err != nil {
@@ -174,20 +178,20 @@ func buildCertificates(
174178
// check if a Certificate for this TLS entry already exists, and if it
175179
// does then skip this entry
176180
if existingCrt != nil {
177-
glog.V(3).Infof("certificate already exists for this object, ensuring it is up to date")
181+
nl.Debugf(l, "certificate already exists for this object, ensuring it is up to date")
178182

179183
if metav1.GetControllerOf(existingCrt) == nil {
180-
glog.V(3).Infof("certificate resource has no owner. refusing to update non-owned certificate resource for object")
184+
nl.Debugf(l, "certificate resource has no owner. refusing to update non-owned certificate resource for object")
181185
return nil, nil, nil
182186
}
183187

184188
if !metav1.IsControlledBy(existingCrt, vs) {
185-
glog.V(3).Infof("certificate resource is not owned by this object. refusing to update non-owned certificate resource for object")
189+
nl.Debugf(l, "certificate resource is not owned by this object. refusing to update non-owned certificate resource for object")
186190
return nil, nil, nil
187191
}
188192

189193
if !certNeedsUpdate(existingCrt, crt) {
190-
glog.V(3).Infof("certificate resource is already up to date for object")
194+
nl.Debugf(l, "certificate resource is already up to date for object")
191195
return nil, nil, nil
192196
}
193197

internal/externaldns/controller.go

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ import (
66
"sync"
77
"time"
88

9-
"github.com/golang/glog"
9+
nl "github.com/nginxinc/kubernetes-ingress/internal/logger"
1010
conf_v1 "github.com/nginxinc/kubernetes-ingress/pkg/apis/configuration/v1"
1111
extdns_v1 "github.com/nginxinc/kubernetes-ingress/pkg/apis/externaldns/v1"
1212
k8s_nginx "github.com/nginxinc/kubernetes-ingress/pkg/client/clientset/versioned"
@@ -113,7 +113,9 @@ func (c *ExtDNSController) Run(stopCh <-chan struct{}) {
113113
ctx, cancel := context.WithCancel(c.ctx)
114114
defer cancel()
115115

116-
glog.Infof("Starting external-dns control loop")
116+
l := nl.LoggerFromContext(ctx)
117+
118+
nl.Info(l, "Starting external-dns control loop")
117119

118120
var mustSync []cache.InformerSynced
119121
for _, ig := range c.informerGroup {
@@ -122,17 +124,17 @@ func (c *ExtDNSController) Run(stopCh <-chan struct{}) {
122124
}
123125

124126
// wait for all informer caches to be synced
125-
glog.V(3).Infof("Waiting for %d caches to sync", len(mustSync))
127+
nl.Debugf(l, "Waiting for %d caches to sync", len(mustSync))
126128
if !cache.WaitForNamedCacheSync(ControllerName, stopCh, mustSync...) {
127-
glog.Fatal("error syncing extDNS queue")
129+
nl.Fatal(l, "error syncing extDNS queue")
128130
}
129131

130-
glog.V(3).Infof("Queue is %v", c.queue.Len())
132+
nl.Debugf(l, "Queue is %v", c.queue.Len())
131133

132134
go c.runWorker(ctx)
133135

134136
<-stopCh
135-
glog.V(3).Infof("shutting down queue as workqueue signaled shutdown")
137+
nl.Debugf(l, "shutting down queue as workqueue signaled shutdown")
136138
for _, ig := range c.informerGroup {
137139
ig.stop()
138140
}
@@ -150,7 +152,8 @@ func (nsi *namespacedInformer) stop() {
150152
// runWorker is a long-running function that will continually call the processItem
151153
// function in order to read and process a message on the workqueue.
152154
func (c *ExtDNSController) runWorker(ctx context.Context) {
153-
glog.V(3).Infof("processing items on the workqueue")
155+
l := nl.LoggerFromContext(ctx)
156+
nl.Debugf(l, "processing items on the workqueue")
154157
for {
155158
obj, shutdown := c.queue.Get()
156159
if shutdown {
@@ -165,11 +168,11 @@ func (c *ExtDNSController) runWorker(ctx context.Context) {
165168
}
166169

167170
if err := c.processItem(ctx, key); err != nil {
168-
glog.V(3).Infof("Re-queuing item due to error processing: %v", err)
171+
nl.Debugf(l, "Re-queuing item due to error processing: %v", err)
169172
c.queue.AddRateLimited(obj)
170173
return
171174
}
172-
glog.V(3).Infof("finished processing work item")
175+
nl.Debugf(l, "finished processing work item")
173176
c.queue.Forget(obj)
174177
}()
175178
}
@@ -181,6 +184,7 @@ func (c *ExtDNSController) processItem(ctx context.Context, key string) error {
181184
runtime.HandleError(fmt.Errorf("invalid resource key: %s", key))
182185
return err
183186
}
187+
l := nl.LoggerFromContext(ctx)
184188
var vs *conf_v1.VirtualServer
185189
nsi := getNamespacedInformer(namespace, c.informerGroup)
186190
vs, err = nsi.vsLister.VirtualServers(namespace).Get(name)
@@ -193,7 +197,7 @@ func (c *ExtDNSController) processItem(ctx context.Context, key string) error {
193197
if err != nil {
194198
return err
195199
}
196-
glog.V(3).Infof("processing virtual server resource")
200+
nl.Debugf(l, "processing virtual server resource")
197201
return c.sync(ctx, vs)
198202
}
199203

@@ -255,7 +259,8 @@ func getNamespacedInformer(ns string, ig map[string]*namespacedInformer) *namesp
255259

256260
// AddNewNamespacedInformer adds watchers for a new namespace
257261
func (c *ExtDNSController) AddNewNamespacedInformer(ns string) {
258-
glog.V(3).Infof("Adding or Updating cert-manager Watchers for Namespace: %v", ns)
262+
l := nl.LoggerFromContext(c.ctx)
263+
nl.Debugf(l, "Adding or Updating cert-manager Watchers for Namespace: %v", ns)
259264
nsi := getNamespacedInformer(ns, c.informerGroup)
260265
if nsi == nil {
261266
nsi = c.newNamespacedInformer(ns)
@@ -268,7 +273,8 @@ func (c *ExtDNSController) AddNewNamespacedInformer(ns string) {
268273

269274
// RemoveNamespacedInformer removes watchers for a namespace we are no longer watching
270275
func (c *ExtDNSController) RemoveNamespacedInformer(ns string) {
271-
glog.V(3).Infof("Deleting cert-manager Watchers for Deleted Namespace: %v", ns)
276+
l := nl.LoggerFromContext(c.ctx)
277+
nl.Debugf(l, "Deleting cert-manager Watchers for Deleted Namespace: %v", ns)
272278
nsi := getNamespacedInformer(ns, c.informerGroup)
273279
if nsi != nil {
274280
nsi.lock.Lock()

0 commit comments

Comments
 (0)