Skip to content

Commit ecafeca

Browse files
committed
fix(logging): use structure logging in checkAPIServiceResources
1 parent c82dca5 commit ecafeca

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

pkg/controller/operators/olm/apiservices.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
5353
serviceName := APIServiceNameToServiceName(apiServiceName)
5454
service, err := a.lister.CoreV1().ServiceLister().Services(csv.GetNamespace()).Get(serviceName)
5555
if err != nil {
56-
logger.Warnf("could not retrieve generated Service %s", serviceName)
56+
logger.WithField("service", serviceName).Warnf("could not retrieve generated Service")
5757
return err
5858
}
5959

@@ -65,7 +65,7 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
6565

6666
// Check if the APIService points to the correct service
6767
if apiService.Spec.Service.Name != serviceName || apiService.Spec.Service.Namespace != csv.GetNamespace() {
68-
logger.Warnf("APIService service reference mismatch %s %s", apiService.Spec.Service.Name, apiService.Spec.Service.Namespace)
68+
logger.WithFields(log.Fields{"service": apiService.Spec.Service.Name, "serviceNamespace": apiService.Spec.Service.Namespace}).Warnf("APIService service reference mismatch")
6969
return fmt.Errorf("APIService service reference mismatch")
7070
}
7171

@@ -85,7 +85,7 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
8585
secretName := apiServiceName + "-cert"
8686
secret, err := a.lister.CoreV1().SecretLister().Secrets(csv.GetNamespace()).Get(secretName)
8787
if err != nil {
88-
logger.Warnf("could not retrieve generated Secret %s", secretName)
88+
logger.WithField("secret", secretName).Warnf("could not retrieve generated Secret")
8989
return err
9090
}
9191
cert, err := certs.PEMToCert(secret.Data["tls.crt"])
@@ -101,7 +101,7 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
101101
// Check if CA hash matches expected
102102
caHash := hashFunc(caBundle)
103103
if hash, ok := secret.GetAnnotations()[OLMCAHashAnnotationKey]; !ok || hash != caHash {
104-
logger.Warnf("secret %s CA cert hash does not match expected", secretName)
104+
logger.WithField("secret", secretName).Warnf("secret CA cert hash does not match expected")
105105
return fmt.Errorf("secret %s CA cert hash does not match expected", secretName)
106106
}
107107

@@ -119,19 +119,19 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
119119
// Ensure the existing Deployment has a matching CA hash annotation
120120
deployment, err := a.lister.AppsV1().DeploymentLister().Deployments(csv.GetNamespace()).Get(desc.DeploymentName)
121121
if k8serrors.IsNotFound(err) || err != nil {
122-
logger.Warnf("expected Deployment %s could not be retrieved", desc.DeploymentName)
122+
logger.WithField("deployment", desc.DeploymentName).Warnf("expected Deployment could not be retrieved")
123123
return err
124124
}
125125
if hash, ok := deployment.Spec.Template.GetAnnotations()[OLMCAHashAnnotationKey]; !ok || hash != caHash {
126-
logger.Warnf("Deployment %s CA cert hash does not match expected", desc.DeploymentName)
126+
logger.WithField("deployment", desc.DeploymentName).Warnf("Deployment CA cert hash does not match expected")
127127
return fmt.Errorf("Deployment %s CA cert hash does not match expected", desc.DeploymentName)
128128
}
129129

130130
// Ensure the Deployment's ServiceAccount exists
131131
serviceAccountName := deployment.Spec.Template.Spec.ServiceAccountName
132132
serviceAccount, err := a.lister.CoreV1().ServiceAccountLister().ServiceAccounts(deployment.GetNamespace()).Get(serviceAccountName)
133133
if err != nil {
134-
logger.Warnf("could not retrieve ServiceAccount %s", serviceAccountName)
134+
logger.WithField("serviceaccount", serviceAccountName).Warnf("could not retrieve ServiceAccount")
135135
return err
136136
}
137137

@@ -170,11 +170,11 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
170170
for _, rule := range rules {
171171
satisfied, err := ruleChecker.RuleSatisfied(serviceAccount, namespace, rule)
172172
if err != nil {
173-
logger.Warnf("error checking Rule %+v", rule)
173+
logger.WithField("rule", fmt.Sprintf("%+v", rule)).Warnf("error checking Rule")
174174
return err
175175
}
176176
if !satisfied {
177-
logger.Warnf("Rule %+v not satisfied", rule)
177+
logger.WithField("rule", fmt.Sprintf("%+v", rule)).Warnf("Rule not satisfied")
178178
return fmt.Errorf("Rule %+v not satisfied", rule)
179179
}
180180
}

scripts/build_local.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
set -e
77

88
if [ -z "$NO_MINIKUBE" ]; then
9-
ps x | grep -q [m]inikube || minikube start --kubernetes-version="v1.12.0" --extra-config=apiserver.v=4 || { echo 'Cannot start minikube.'; exit 1; }
9+
ps x | grep -q [m]inikube || minikube start --kubernetes-version="v1.11.0" --extra-config=apiserver.v=4 || { echo 'Cannot start minikube.'; exit 1; }
1010
eval $(minikube docker-env) || { echo 'Cannot switch to minikube docker'; exit 1; }
1111
kubectl config use-context minikube
1212
fi

0 commit comments

Comments
 (0)