@@ -12,6 +12,7 @@ import (
12
12
"encoding/pem"
13
13
"flag"
14
14
"fmt"
15
+ "go.uber.org/zap"
15
16
"math/big"
16
17
"os"
17
18
"time"
@@ -29,7 +30,6 @@ import (
29
30
"sigs.k8s.io/controller-runtime/pkg/client"
30
31
"sigs.k8s.io/controller-runtime/pkg/controller"
31
32
"sigs.k8s.io/controller-runtime/pkg/handler"
32
- logf "sigs.k8s.io/controller-runtime/pkg/log"
33
33
"sigs.k8s.io/controller-runtime/pkg/manager"
34
34
"sigs.k8s.io/controller-runtime/pkg/reconcile"
35
35
"sigs.k8s.io/controller-runtime/pkg/source"
@@ -44,7 +44,7 @@ const (
44
44
lookaheadInterval = 90 * 24 * time .Hour
45
45
)
46
46
47
- var crLog = logf . Log . WithName ( "cert-rotation" )
47
+ var crLog , _ = zap . NewDevelopment ( )
48
48
49
49
//WebhookType it the type of webhook, either validating/mutating webhook or a CRD conversion webhook
50
50
type WebhookType int
@@ -182,7 +182,7 @@ func (cr *CertRotator) Start(stop <-chan struct{}) error {
182
182
crLog .Info ("starting cert rotator controller" )
183
183
defer crLog .Info ("stopping cert rotator controller" )
184
184
if err := cr .refreshCertIfNeeded (); err != nil {
185
- crLog .Error (err , "could not refresh cert on startup" )
185
+ crLog .Error ("could not refresh cert on startup" , zap . Error ( err ) )
186
186
return err
187
187
}
188
188
@@ -197,7 +197,7 @@ tickerLoop:
197
197
select {
198
198
case <- ticker .C :
199
199
if err := cr .refreshCertIfNeeded (); err != nil {
200
- crLog .Error (err , "error rotating certs" )
200
+ crLog .Error ("error rotating certs" , zap . Error ( err ) )
201
201
}
202
202
case <- stop :
203
203
break tickerLoop
@@ -222,7 +222,7 @@ func (cr *CertRotator) refreshCertIfNeeded() error {
222
222
if secret .Data == nil || ! cr .validCACert (secret .Data [caCertName ], secret .Data [caKeyName ]) {
223
223
crLog .Info ("refreshing CA and server certs" )
224
224
if err := cr .refreshCerts (true , secret ); err != nil {
225
- crLog .Error (err , "could not refresh CA and server certs" )
225
+ crLog .Error ("could not refresh CA and server certs" , zap . Error ( err ) )
226
226
return false , nil
227
227
}
228
228
crLog .Info ("server certs refreshed" )
@@ -236,7 +236,7 @@ func (cr *CertRotator) refreshCertIfNeeded() error {
236
236
if ! cr .validServerCert (secret .Data [caCertName ], secret .Data [certName ], secret .Data [keyName ]) {
237
237
crLog .Info ("refreshing server certs" )
238
238
if err := cr .refreshCerts (false , secret ); err != nil {
239
- crLog .Error (err , "could not refresh server certs" )
239
+ crLog .Error ("could not refresh server certs" , zap . Error ( err ) )
240
240
return false , nil
241
241
}
242
242
crLog .Info ("server certs refreshed" )
@@ -685,38 +685,34 @@ func (r *ReconcileWH) ensureCerts(certPem []byte) error {
685
685
686
686
for _ , webhook := range r .webhooks {
687
687
gvk := webhook .gvk ()
688
- log := crLog .WithValues ("name" , webhook .Name , "gvk" , gvk )
689
688
updatedResource := & unstructured.Unstructured {}
690
689
updatedResource .SetGroupVersionKind (gvk )
691
690
if err := r .cache .Get (r .ctx , types.NamespacedName {Name : webhook .Name }, updatedResource ); err != nil {
692
691
if k8sErrors .IsNotFound (err ) {
693
- fmt .Println ("Webhook not found. Unable to update certificate." , err )
694
- log .Error (err , "Webhook not found. Unable to update certificate." )
692
+ crLog .Error ("Webhook not found. Unable to update certificate." , zap .Error (err ))
695
693
continue
696
694
}
697
695
anyError = err
698
- log .Error (err , "Error getting webhook for certificate update." )
699
- fmt .Println ("Error getting webhook for certificate update." , err )
696
+ crLog .Error ("Error getting webhook for certificate update." , zap .Error (err ))
700
697
701
698
continue
702
699
}
703
700
if ! updatedResource .GetDeletionTimestamp ().IsZero () {
704
- fmt .Println ("Webhook is being deleted. Unable to update certificate" )
705
- log .Info ("Webhook is being deleted. Unable to update certificate" )
701
+ crLog .Info ("Webhook is being deleted. Unable to update certificate" )
706
702
continue
707
703
}
708
704
709
- log .Info ("Ensuring CA cert" , "name" , webhook . Name , "gvk" , gvk )
705
+ crLog .Info ("Ensuring CA cert" )
710
706
if err := injectCert (updatedResource , certPem , webhook .Type ); err != nil {
711
707
fmt .Println ("Unable to inject cert to webhook.:" , err )
712
- log .Error (err , "Unable to inject cert to webhook." )
708
+ crLog .Error ("Unable to inject cert to webhook." , zap . Error ( err ) )
713
709
anyError = err
714
710
continue
715
711
}
716
712
if err := r .writer .Update (r .ctx , updatedResource ); err != nil {
717
713
fmt .Println ("Error updating webhook with certificate:" , err )
718
714
719
- log .Error (err , "Error updating webhook with certificate" )
715
+ crLog .Error ("Error updating webhook with certificate" , zap . Error ( err ) )
720
716
anyError = err
721
717
continue
722
718
}
@@ -740,7 +736,7 @@ func (cr *CertRotator) ensureCertsMounted() {
740
736
Jitter : 1 ,
741
737
Steps : 10 ,
742
738
}, checkFn ); err != nil {
743
- crLog .Error (err , "max retries for checking certs existence" )
739
+ crLog .Error ("max retries for checking certs existence" , zap . Error ( err ) )
744
740
close (cr .certsNotMounted )
745
741
return
746
742
}
@@ -760,7 +756,7 @@ func (cr *CertRotator) ensureReady() {
760
756
Jitter : 1 ,
761
757
Steps : 10 ,
762
758
}, checkFn ); err != nil {
763
- crLog .Error (err , "max retries for checking CA injection" )
759
+ crLog .Error ("max retries for checking CA injection" , zap . Error ( err ) )
764
760
close (cr .caNotInjected )
765
761
return
766
762
}
0 commit comments