@@ -12,6 +12,7 @@ import (
1212 "encoding/pem"
1313 "flag"
1414 "fmt"
15+ "go.uber.org/zap"
1516 "math/big"
1617 "os"
1718 "time"
@@ -29,7 +30,6 @@ import (
2930 "sigs.k8s.io/controller-runtime/pkg/client"
3031 "sigs.k8s.io/controller-runtime/pkg/controller"
3132 "sigs.k8s.io/controller-runtime/pkg/handler"
32- logf "sigs.k8s.io/controller-runtime/pkg/log"
3333 "sigs.k8s.io/controller-runtime/pkg/manager"
3434 "sigs.k8s.io/controller-runtime/pkg/reconcile"
3535 "sigs.k8s.io/controller-runtime/pkg/source"
@@ -44,7 +44,7 @@ const (
4444 lookaheadInterval = 90 * 24 * time .Hour
4545)
4646
47- var crLog = logf . Log . WithName ( "cert-rotation" )
47+ var crLog , _ = zap . NewDevelopment ( )
4848
4949//WebhookType it the type of webhook, either validating/mutating webhook or a CRD conversion webhook
5050type WebhookType int
@@ -182,7 +182,7 @@ func (cr *CertRotator) Start(stop <-chan struct{}) error {
182182 crLog .Info ("starting cert rotator controller" )
183183 defer crLog .Info ("stopping cert rotator controller" )
184184 if err := cr .refreshCertIfNeeded (); err != nil {
185- crLog .Error (err , "could not refresh cert on startup" )
185+ crLog .Error ("could not refresh cert on startup" , zap . Error ( err ) )
186186 return err
187187 }
188188
@@ -197,7 +197,7 @@ tickerLoop:
197197 select {
198198 case <- ticker .C :
199199 if err := cr .refreshCertIfNeeded (); err != nil {
200- crLog .Error (err , "error rotating certs" )
200+ crLog .Error ("error rotating certs" , zap . Error ( err ) )
201201 }
202202 case <- stop :
203203 break tickerLoop
@@ -222,7 +222,7 @@ func (cr *CertRotator) refreshCertIfNeeded() error {
222222 if secret .Data == nil || ! cr .validCACert (secret .Data [caCertName ], secret .Data [caKeyName ]) {
223223 crLog .Info ("refreshing CA and server certs" )
224224 if err := cr .refreshCerts (true , secret ); err != nil {
225- crLog .Error (err , "could not refresh CA and server certs" )
225+ crLog .Error ("could not refresh CA and server certs" , zap . Error ( err ) )
226226 return false , nil
227227 }
228228 crLog .Info ("server certs refreshed" )
@@ -236,7 +236,7 @@ func (cr *CertRotator) refreshCertIfNeeded() error {
236236 if ! cr .validServerCert (secret .Data [caCertName ], secret .Data [certName ], secret .Data [keyName ]) {
237237 crLog .Info ("refreshing server certs" )
238238 if err := cr .refreshCerts (false , secret ); err != nil {
239- crLog .Error (err , "could not refresh server certs" )
239+ crLog .Error ("could not refresh server certs" , zap . Error ( err ) )
240240 return false , nil
241241 }
242242 crLog .Info ("server certs refreshed" )
@@ -685,38 +685,34 @@ func (r *ReconcileWH) ensureCerts(certPem []byte) error {
685685
686686 for _ , webhook := range r .webhooks {
687687 gvk := webhook .gvk ()
688- log := crLog .WithValues ("name" , webhook .Name , "gvk" , gvk )
689688 updatedResource := & unstructured.Unstructured {}
690689 updatedResource .SetGroupVersionKind (gvk )
691690 if err := r .cache .Get (r .ctx , types.NamespacedName {Name : webhook .Name }, updatedResource ); err != nil {
692691 if k8sErrors .IsNotFound (err ) {
693- fmt .Println ("Webhook not found. Unable to update certificate." , err )
694- log .Error (err , "Webhook not found. Unable to update certificate." )
692+ crLog .Error ("Webhook not found. Unable to update certificate." , zap .Error (err ))
695693 continue
696694 }
697695 anyError = err
698- log .Error (err , "Error getting webhook for certificate update." )
699- fmt .Println ("Error getting webhook for certificate update." , err )
696+ crLog .Error ("Error getting webhook for certificate update." , zap .Error (err ))
700697
701698 continue
702699 }
703700 if ! updatedResource .GetDeletionTimestamp ().IsZero () {
704- fmt .Println ("Webhook is being deleted. Unable to update certificate" )
705- log .Info ("Webhook is being deleted. Unable to update certificate" )
701+ crLog .Info ("Webhook is being deleted. Unable to update certificate" )
706702 continue
707703 }
708704
709- log .Info ("Ensuring CA cert" , "name" , webhook . Name , "gvk" , gvk )
705+ crLog .Info ("Ensuring CA cert" )
710706 if err := injectCert (updatedResource , certPem , webhook .Type ); err != nil {
711707 fmt .Println ("Unable to inject cert to webhook.:" , err )
712- log .Error (err , "Unable to inject cert to webhook." )
708+ crLog .Error ("Unable to inject cert to webhook." , zap . Error ( err ) )
713709 anyError = err
714710 continue
715711 }
716712 if err := r .writer .Update (r .ctx , updatedResource ); err != nil {
717713 fmt .Println ("Error updating webhook with certificate:" , err )
718714
719- log .Error (err , "Error updating webhook with certificate" )
715+ crLog .Error ("Error updating webhook with certificate" , zap . Error ( err ) )
720716 anyError = err
721717 continue
722718 }
@@ -740,7 +736,7 @@ func (cr *CertRotator) ensureCertsMounted() {
740736 Jitter : 1 ,
741737 Steps : 10 ,
742738 }, checkFn ); err != nil {
743- crLog .Error (err , "max retries for checking certs existence" )
739+ crLog .Error ("max retries for checking certs existence" , zap . Error ( err ) )
744740 close (cr .certsNotMounted )
745741 return
746742 }
@@ -760,7 +756,7 @@ func (cr *CertRotator) ensureReady() {
760756 Jitter : 1 ,
761757 Steps : 10 ,
762758 }, checkFn ); err != nil {
763- crLog .Error (err , "max retries for checking CA injection" )
759+ crLog .Error ("max retries for checking CA injection" , zap . Error ( err ) )
764760 close (cr .caNotInjected )
765761 return
766762 }
0 commit comments