@@ -29,7 +29,7 @@ func createOrUpdateDestinationSecretsFromSource(ctx context.Context, rc client.C
29
29
logger := log .FromContext (ctx )
30
30
err := common .ValidateSourceSecret (sourceSecret )
31
31
if err != nil {
32
- logger .Error (err , "Updating secrets failed. Invalid secret type." , "secret" , sourceSecret )
32
+ logger .Error (err , "Updating secrets failed. Invalid secret type." , "secret" , sourceSecret . Name )
33
33
return err
34
34
}
35
35
@@ -44,10 +44,10 @@ func createOrUpdateDestinationSecretsFromSource(ctx context.Context, rc client.C
44
44
45
45
uniqueConnectedPeers , err := PeersConnectedToSecret (sourceSecret , mirrorPeers )
46
46
if err != nil {
47
- logger .Error (err , "ConnectedPeers returned an error" , "secret" , sourceSecret , "mirrorpeers" , mirrorPeers )
47
+ logger .Error (err , "ConnectedPeers returned an error" , "secret" , sourceSecret . Name , "mirrorpeers" , mirrorPeers )
48
48
return err
49
49
}
50
- logger .V (2 ).Info ("Listing all the Peers connected to the Source" , "SourceSecret" , sourceSecret , "#connected-peers" , len (uniqueConnectedPeers ))
50
+ logger .V (2 ).Info ("Listing all the Peers connected to the Source" , "SourceSecret" , sourceSecret . Name , "#connected-peers" , len (uniqueConnectedPeers ))
51
51
52
52
// anyErr will have the last found error
53
53
var anyErr error
@@ -67,7 +67,7 @@ func processDestinationSecretUpdation(ctx context.Context, rc client.Client, des
67
67
logger := log .FromContext (ctx )
68
68
err := common .ValidateDestinationSecret (destSecret )
69
69
if err != nil {
70
- logger .Error (err , "Destination secret validation failed" , "secret" , destSecret )
70
+ logger .Error (err , "Destination secret validation failed" , "secret" , destSecret . Name )
71
71
return err
72
72
}
73
73
mirrorPeers , err := common .FetchAllMirrorPeers (ctx , rc )
@@ -77,7 +77,7 @@ func processDestinationSecretUpdation(ctx context.Context, rc client.Client, des
77
77
}
78
78
uniqueConnectedPeers , err := PeersConnectedToSecret (destSecret , mirrorPeers )
79
79
if err != nil {
80
- logger .Error (err , "Failed to get the peers connected to the secret" , "secret" , destSecret )
80
+ logger .Error (err , "Failed to get the peers connected to the secret" , "secret" , destSecret . Name )
81
81
return err
82
82
}
83
83
var connectedSource * corev1.Secret
@@ -89,7 +89,7 @@ func processDestinationSecretUpdation(ctx context.Context, rc client.Client, des
89
89
if k8serrors .IsNotFound (err ) {
90
90
continue
91
91
}
92
- logger .Error (err , "Unexpected error while finding the source secret" , "peer-ref" , eachConnectedPeer , "secret" , destSecret )
92
+ logger .Error (err , "Unexpected error while finding the source secret" , "peer-ref" , eachConnectedPeer , "secret" , destSecret . Name )
93
93
return err
94
94
}
95
95
if common .IsSecretSource (& connectedSecret ) {
@@ -99,7 +99,7 @@ func processDestinationSecretUpdation(ctx context.Context, rc client.Client, des
99
99
}
100
100
101
101
if connectedSource == nil {
102
- logger .Error (nil , "No connected source found. Removing the dangling destination secret" , "secret" , destSecret )
102
+ logger .Error (nil , "No connected source found. Removing the dangling destination secret" , "secret" , destSecret . Name )
103
103
err = rc .Delete (ctx , destSecret )
104
104
return err
105
105
}
@@ -119,7 +119,7 @@ func processDestinationSecretCleanup(ctx context.Context, rc client.Client) erro
119
119
err = processDestinationSecretUpdation (ctx , rc , & eachDSecret )
120
120
if err != nil {
121
121
anyError = err
122
- logger .Error (err , "Failed to update destination secret" , "secret" , eachDSecret )
122
+ logger .Error (err , "Failed to update destination secret" , "secret" , eachDSecret . Name )
123
123
}
124
124
}
125
125
return anyError
@@ -153,7 +153,7 @@ func createOrUpdateRamenS3Secret(ctx context.Context, rc client.Client, secret *
153
153
if err != nil {
154
154
if k8serrors .IsNotFound (err ) {
155
155
// creating new s3 secret on ramen openshift-dr-system namespace
156
- logger .Info ("Creating a s3 secret" , "secret" , expectedSecret )
156
+ logger .Info ("Creating a s3 secret" , "secret" , expectedSecret . Name )
157
157
return rc .Create (ctx , & expectedSecret )
158
158
}
159
159
logger .Error (err , "unable to fetch the s3 secret" , "secret" , secret .Name , "namespace" , ramenHubNamespace )
@@ -289,7 +289,7 @@ func createOrUpdateSecretsFromInternalSecret(ctx context.Context, rc client.Clie
289
289
logger := log .FromContext (ctx )
290
290
291
291
if err := common .ValidateInternalSecret (secret , common .InternalLabel ); err != nil {
292
- logger .Error (err , "Provided internal secret is not valid" , "secret" , secret )
292
+ logger .Error (err , "Provided internal secret is not valid" , "secret" , secret . Name )
293
293
return err
294
294
}
295
295
@@ -348,7 +348,7 @@ func processDeletedSecrets(ctx context.Context, rc client.Client, req types.Name
348
348
// secrets of same name.
349
349
if sourceSecretPointer != nil {
350
350
err = errors .New ("multiple source secrets detected" )
351
- logger .Error (err , "Cannot have more than one source secrets with the same name" , "request" , req , "source-secret" , * sourceSecretPointer )
351
+ logger .Error (err , "Cannot have more than one source secrets with the same name" , "request" , req , "source-secret" , sourceSecretPointer . Name )
352
352
return err
353
353
}
354
354
sourceSecretPointer = eachSecret .DeepCopy ()
@@ -358,7 +358,7 @@ func processDeletedSecrets(ctx context.Context, rc client.Client, req types.Name
358
358
}
359
359
}
360
360
361
- logger .V (2 ).Info ("List of secrets with requested name" , "secret-name" , req .Name , "secretlist" , sameNamedDestinationSecrets , "#secrets " , len (sameNamedDestinationSecrets ))
361
+ logger .V (2 ).Info ("List of secrets with requested name" , "secret-name" , req .Name , "secret-length " , len (sameNamedDestinationSecrets ))
362
362
363
363
if sourceSecretPointer == nil {
364
364
// if there is neither source secret nor any other similarly named secrets,
@@ -372,7 +372,7 @@ func processDeletedSecrets(ctx context.Context, rc client.Client, req types.Name
372
372
for _ , eachDestSecret := range sameNamedDestinationSecrets {
373
373
err = rc .Delete (ctx , & eachDestSecret )
374
374
if err != nil {
375
- logger .Error (err , "Deletion failed" , "secret" , eachDestSecret )
375
+ logger .Error (err , "Deletion failed" , "secret" , eachDestSecret . Name )
376
376
anyErr = err
377
377
}
378
378
}
@@ -388,7 +388,7 @@ func processDeletedSecrets(ctx context.Context, rc client.Client, req types.Name
388
388
// and restore the missing destination secret
389
389
err = createOrUpdateDestinationSecretsFromSource (ctx , rc , sourceSecretPointer )
390
390
if err != nil {
391
- logger .Error (err , "Unable to update the destination secret" , "source-secret" , sourceSecretPointer )
391
+ logger .Error (err , "Unable to update the destination secret" , "source-secret" , sourceSecretPointer . Name )
392
392
return err
393
393
}
394
394
}
0 commit comments