@@ -31,6 +31,7 @@ import (
3131 "sigs.k8s.io/cluster-api/util/secret"
3232 "sigs.k8s.io/controller-runtime/pkg/client"
3333 "sigs.k8s.io/controller-runtime/pkg/conversion"
34+ "sigs.k8s.io/controller-runtime/pkg/log"
3435
3536 infrav1 "sigs.k8s.io/cluster-api-provider-azure/api/v1beta1"
3637 "sigs.k8s.io/cluster-api-provider-azure/azure"
@@ -142,35 +143,34 @@ func postCreateOrUpdateResourceHook(ctx context.Context, scope ManagedClusterSco
142143 The user needs to ensure to provide service principal with admin AAD privileges.
143144*/
144145func reconcileKubeconfig (ctx context.Context , scope ManagedClusterScope , namespace string ) (adminKubeConfigData []byte , userKubeConfigData []byte , err error ) {
145- fmt .Printf ("=== DEBUG: reconcileKubeconfig() called for cluster: %s ===\n " , scope .ClusterName ())
146- fmt .Printf ("DEBUG: Namespace: %s\n " , namespace )
147- fmt .Printf ("DEBUG: IsAADEnabled: %v\n " , scope .IsAADEnabled ())
148- fmt .Printf ("DEBUG: AreLocalAccountsDisabled: %v\n " , scope .AreLocalAccountsDisabled ())
146+ logger := log .FromContext (ctx )
147+ logger .V (1 ).Info ("reconcileKubeconfig called" , "cluster" , scope .ClusterName ())
148+ logger .V (1 ).Info ("kubeconfig reconciliation details" , "namespace" , namespace , "isAADEnabled" , scope .IsAADEnabled (), "areLocalAccountsDisabled" , scope .AreLocalAccountsDisabled ())
149149
150150 if scope .IsAADEnabled () {
151- fmt . Printf ( "DEBUG: AAD is enabled, getting user kubeconfig data\n " )
151+ logger . V ( 1 ). Info ( " AAD is enabled, getting user kubeconfig data" )
152152 if userKubeConfigData , err = getUserKubeconfigData (ctx , scope , namespace ); err != nil {
153- fmt . Printf ( "DEBUG: ERROR - Failed to get user kubeconfig: %v \n " , err )
153+ logger . Error ( err , "failed to get user kubeconfig" )
154154 return nil , nil , errors .Wrap (err , "error while trying to get user kubeconfig" )
155155 }
156- fmt . Printf ( "DEBUG: Got user kubeconfig data: %d bytes\n " , len (userKubeConfigData ))
156+ logger . V ( 1 ). Info ( "got user kubeconfig data" , " bytes" , len (userKubeConfigData ))
157157 }
158158
159159 if scope .AreLocalAccountsDisabled () {
160- fmt . Printf ( "DEBUG: Local accounts disabled, using user kubeconfig with token path\n " )
160+ logger . V ( 1 ). Info ( "local accounts disabled, using user kubeconfig with token path" )
161161 userKubeconfigWithToken , err := getUserKubeConfigWithToken (ctx , userKubeConfigData , scope )
162162 if err != nil {
163- fmt . Printf ( "DEBUG: ERROR - Failed to get user kubeconfig with token: %v \n " , err )
163+ logger . Error ( err , "failed to get user kubeconfig with token" )
164164 return nil , nil , errors .Wrap (err , "error while trying to get user kubeconfig with token" )
165165 }
166- fmt . Printf ( "DEBUG: Successfully got user kubeconfig with token: %d bytes\n " , len (userKubeconfigWithToken ))
166+ logger . V ( 1 ). Info ( "successfully got user kubeconfig with token" , " bytes" , len (userKubeconfigWithToken ))
167167 return userKubeconfigWithToken , userKubeConfigData , nil
168168 }
169169
170- fmt . Printf ( "DEBUG: Using admin kubeconfig path (local accounts enabled)\n " )
170+ logger . V ( 1 ). Info ( "using admin kubeconfig path (local accounts enabled)" )
171171 asoSecret := & corev1.Secret {}
172172 secretName := adminKubeconfigSecretName (scope .ClusterName ())
173- fmt . Printf ( "DEBUG: Looking for ASO admin kubeconfig secret: %s/%s \n " , namespace , secretName )
173+ logger . V ( 1 ). Info ( "looking for ASO admin kubeconfig secret" , "namespace" , namespace , "secretName" , secretName )
174174
175175 err = scope .GetClient ().Get (
176176 ctx ,
@@ -181,15 +181,14 @@ func reconcileKubeconfig(ctx context.Context, scope ManagedClusterScope, namespa
181181 asoSecret ,
182182 )
183183 if err != nil {
184- fmt . Printf ( "DEBUG: ERROR - Failed to get ASO admin kubeconfig secret: %v \n " , err )
184+ logger . Error ( err , "failed to get ASO admin kubeconfig secret" )
185185 return nil , nil , errors .Wrap (err , "failed to get ASO admin kubeconfig secret" )
186186 }
187187
188188 adminKubeConfigData = asoSecret .Data [secret .KubeconfigDataName ]
189- fmt . Printf ( "DEBUG: Retrieved admin kubeconfig from ASO secret: %d bytes\n " , len (adminKubeConfigData ))
189+ logger . V ( 1 ). Info ( "retrieved admin kubeconfig from ASO secret" , " bytes" , len (adminKubeConfigData ))
190190
191- fmt .Printf ("DEBUG: reconcileKubeconfig() completed - admin: %d bytes, user: %d bytes\n " ,
192- len (adminKubeConfigData ), len (userKubeConfigData ))
191+ logger .V (1 ).Info ("reconcileKubeconfig completed" , "adminBytes" , len (adminKubeConfigData ), "userBytes" , len (userKubeConfigData ))
193192 return adminKubeConfigData , userKubeConfigData , nil
194193}
195194
@@ -232,10 +231,3 @@ func getUserKubeConfigWithToken(ctx context.Context, userKubeConfigData []byte,
232231 }
233232 return kubeconfig , nil
234233}
235-
236- func min (a , b int ) int {
237- if a < b {
238- return a
239- }
240- return b
241- }
0 commit comments