Skip to content

Commit 34229bf

Browse files
committed
Revert changes in sub modules
1 parent 475713b commit 34229bf

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+753
-515
lines changed

cmd/cloud-controller-manager/app/controllermanager.go

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ func RunWrapper(s *options.CloudControllerManagerOptions, c *cloudcontrollerconf
214214
logger := log.Background().WithName("RunWrapper")
215215
return func(ctx context.Context) {
216216
if !c.DynamicReloadingConfig.EnableDynamicReloading {
217-
klog.V(1).Infof("using static initialization from config file %s", c.ComponentConfig.KubeCloudShared.CloudProvider.CloudConfigFile)
217+
logger.V(1).Info("using static initialization from config file", "cloudConfigFile", c.ComponentConfig.KubeCloudShared.CloudProvider.CloudConfigFile)
218218
if err := Run(ctx, c.Complete(), h); err != nil {
219219
klog.Errorf("RunWrapper: failed to start cloud controller manager: %v", err)
220220
os.Exit(1)
@@ -224,10 +224,10 @@ func RunWrapper(s *options.CloudControllerManagerOptions, c *cloudcontrollerconf
224224

225225
cloudConfigFile := c.ComponentConfig.KubeCloudShared.CloudProvider.CloudConfigFile
226226
if cloudConfigFile != "" {
227-
klog.V(1).Infof("RunWrapper: using dynamic initialization from config file %s, starting the file watcher", cloudConfigFile)
227+
logger.V(1).Info("using dynamic initialization from config file, starting the file watcher", "cloudConfigFile", cloudConfigFile)
228228
updateCh = dynamic.RunFileWatcherOrDie(cloudConfigFile)
229229
} else {
230-
klog.V(1).Infof("RunWrapper: using dynamic initialization from secret %s/%s, starting the secret watcher", c.DynamicReloadingConfig.CloudConfigSecretNamespace, c.DynamicReloadingConfig.CloudConfigSecretName)
230+
logger.V(1).Info("using dynamic initialization from secret, starting the secret watcher", "namespace", c.DynamicReloadingConfig.CloudConfigSecretNamespace, "name", c.DynamicReloadingConfig.CloudConfigSecretName)
231231
updateCh = dynamic.RunSecretWatcherOrDie(c)
232232
}
233233

@@ -236,7 +236,7 @@ func RunWrapper(s *options.CloudControllerManagerOptions, c *cloudcontrollerconf
236236
for {
237237
select {
238238
case <-updateCh:
239-
klog.V(2).Info("RunWrapper: detected the cloud config has been updated, re-constructing the cloud controller manager")
239+
logger.V(2).Info("detected the cloud config has been updated, re-constructing the cloud controller manager")
240240

241241
// stop the previous goroutines
242242
cancelFunc()
@@ -289,6 +289,7 @@ func shouldDisableCloudProvider(configFilePath string) (bool, error) {
289289
}
290290

291291
func runAsync(s *options.CloudControllerManagerOptions, errCh chan error, h *controllerhealthz.MutableHealthzHandler) context.CancelFunc {
292+
logger := log.Background().WithName("runAsync")
292293
ctx, cancelFunc := context.WithCancel(context.Background())
293294

294295
go func() {
@@ -303,7 +304,7 @@ func runAsync(s *options.CloudControllerManagerOptions, errCh chan error, h *con
303304
errCh <- err
304305
}
305306

306-
klog.V(1).Infof("RunAsync: stopping")
307+
logger.V(1).Info("stopping")
307308
}()
308309

309310
return cancelFunc
@@ -415,7 +416,7 @@ func startControllers(ctx context.Context, controllerContext genericcontrollerma
415416
continue
416417
}
417418

418-
klog.V(1).Infof("Starting %q", controllerName)
419+
logger.V(1).Info("Starting controller", "controller", controllerName)
419420
ctrl, started, err := initFn(ctx, controllerContext, completedConfig, cloud)
420421
if err != nil {
421422
klog.Errorf("Error starting %q: %s", controllerName, err.Error())
@@ -448,11 +449,11 @@ func startControllers(ctx context.Context, controllerContext genericcontrollerma
448449
klog.Fatalf("Failed to wait for apiserver being healthy: %v", err)
449450
}
450451

451-
klog.V(2).Infof("startControllers: starting shared informers")
452+
logger.V(2).Info("startControllers: starting shared informers")
452453
completedConfig.SharedInformers.Start(ctx.Done())
453454
controllerContext.InformerFactory.Start(ctx.Done())
454455
<-ctx.Done()
455-
klog.V(1).Infof("startControllers: received stopping signal, exiting")
456+
logger.V(1).Info("startControllers: received stopping signal, exiting")
456457

457458
return nil
458459
}

cmd/cloud-controller-manager/app/dynamic/secret_watcher.go

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ import (
3030

3131
cloudcontrollerconfig "sigs.k8s.io/cloud-provider-azure/cmd/cloud-controller-manager/app/config"
3232
"sigs.k8s.io/cloud-provider-azure/cmd/cloud-controller-manager/app/options"
33+
"sigs.k8s.io/cloud-provider-azure/pkg/log"
3334
)
3435

3536
type SecretWatcher struct {
@@ -64,6 +65,7 @@ func RunSecretWatcherOrDie(c *cloudcontrollerconfig.Config) chan struct{} {
6465
// NewSecretWatcher creates a SecretWatcher and a signal channel to indicate
6566
// the specific secret has been updated
6667
func NewSecretWatcher(informerFactory informers.SharedInformerFactory, secretName, secretNamespace string) (*SecretWatcher, chan struct{}) {
68+
logger := log.Background().WithName("NewSecretWatcher")
6769
secretInformer := informerFactory.Core().V1().Secrets()
6870
updateSignal := make(chan struct{})
6971

@@ -79,7 +81,7 @@ func NewSecretWatcher(informerFactory informers.SharedInformerFactory, secretNam
7981

8082
if strings.EqualFold(newSecret.Name, secretName) &&
8183
strings.EqualFold(newSecret.Namespace, secretNamespace) {
82-
klog.V(1).Infof("secret %s updated, sending the signal", newSecret.Name)
84+
logger.V(1).Info("secret updated, sending the signal", "secretName", newSecret.Name)
8385
updateSignal <- struct{}{}
8486
}
8587
},

cmd/cloud-node-manager/app/nodemanager.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ func Run(ctx context.Context, c *cloudnodeconfig.Config) error {
125125
// startControllers starts the cloud specific controller loops.
126126
func startControllers(ctx context.Context, c *cloudnodeconfig.Config, healthzHandler *controllerhealthz.MutableHealthzHandler) error {
127127
logger := log.Background().WithName("startControllers")
128-
klog.V(1).Infof("Starting cloud-node-manager...")
128+
logger.V(1).Info("Starting cloud-node-manager...")
129129

130130
// Start the CloudNodeController
131131
nodeController := nodemanager.NewCloudNodeController(

health-probe-proxy/main.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ import (
3232
)
3333

3434
func main() {
35+
logger := klog.Background().WithName("main")
3536
logs.InitLogs()
3637
defer logs.FlushLogs()
3738

@@ -43,17 +44,17 @@ func main() {
4344
targetUrl, _ := url.Parse(fmt.Sprintf("http://localhost:%s", strconv.Itoa(targetPort)))
4445

4546
proxy := httputil.NewSingleHostReverseProxy(targetUrl)
46-
klog.Infof("target url: %s", targetUrl)
47+
logger.Info("", "target url", targetUrl)
4748

4849
http.Handle("/", proxy)
49-
klog.Infof("proxying from port %d to port %d", healthCheckPort, targetPort)
50+
logger.Info("proxying between ports", "from", healthCheckPort, "to", targetPort)
5051

5152
listener, err := net.Listen("tcp", fmt.Sprintf("0.0.0.0:%s", strconv.Itoa(healthCheckPort)))
5253
if err != nil {
5354
klog.Errorf("failed to listen on port %d: %s", targetPort, err)
5455
panic(err)
5556
}
56-
klog.Infof("listening on port %d", healthCheckPort)
57+
logger.Info("listening on port", "port", healthCheckPort)
5758

5859
proxyListener := &proxyproto.Listener{Listener: listener}
5960
defer func(proxyListener *proxyproto.Listener) {
@@ -64,7 +65,7 @@ func main() {
6465
}
6566
}(proxyListener)
6667

67-
klog.Infof("listening on port with proxy listener %d", healthCheckPort)
68+
logger.Info("listening on port with proxy listener", "port", healthCheckPort)
6869
err = http.Serve(proxyListener, nil)
6970
if err != nil {
7071
klog.Errorf("failed to serve: %s", err)

kubetest2-aks/deployer/build.go

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ import (
2222

2323
git "github.com/go-git/go-git/v5"
2424
plumbing "github.com/go-git/go-git/v5/plumbing"
25-
"k8s.io/klog"
25+
"k8s.io/klog/v2"
2626

2727
"sigs.k8s.io/kubetest2/pkg/exec"
2828
)
@@ -87,15 +87,17 @@ func (d *deployer) makeCloudProviderImages(path string) (string, error) {
8787

8888
// makeCloudProviderImagesByPath makes CCM or CNM images with repo path.
8989
func (d *deployer) makeCloudProviderImagesByPath() (string, error) {
90-
klog.Infof("Making Cloud provider images with repo path")
90+
logger := klog.Background().WithName("makeCloudProviderImagesByPath")
91+
logger.Info("Making Cloud provider images with repo path")
9192

9293
path := d.TargetPath
9394
return d.makeCloudProviderImages(path)
9495
}
9596

9697
// makeCloudProviderImagesByTag makes CCM or CNM images with repo refs.
9798
func (d *deployer) makeCloudProviderImagesByTag(url string) (string, error) {
98-
klog.Infof("Making Cloud provider images with refs")
99+
logger := klog.Background().WithName("makeCloudProviderImagesByTag")
100+
logger.Info("Making Cloud provider images with refs")
99101
ccmPath := fmt.Sprintf("%s/cloud-provider-azure", gitClonePath)
100102

101103
repo, err := git.PlainClone(ccmPath, false, &git.CloneOptions{
@@ -118,6 +120,7 @@ func (d *deployer) makeCloudProviderImagesByTag(url string) (string, error) {
118120
}
119121

120122
func (d *deployer) Build() error {
123+
logger := klog.Background().WithName("Build")
121124
err := d.verifyBuildFlags()
122125
if err != nil {
123126
return fmt.Errorf("failed to verify build flags: %v", err)
@@ -134,7 +137,7 @@ func (d *deployer) Build() error {
134137
return fmt.Errorf("failed to make Cloud provider image with tag %q: %v", d.TargetTag, err)
135138
}
136139
}
137-
klog.Infof("cloud-provider-azure image with tag %q are ready", imageTag)
140+
logger.Info("cloud-provider-azure image are ready", "imageTag", imageTag)
138141
}
139142

140143
return nil

kubetest2-aks/deployer/down.go

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,12 @@ import (
2222
"github.com/Azure/azure-sdk-for-go/sdk/azcore"
2323
"github.com/Azure/azure-sdk-for-go/sdk/azidentity"
2424
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources"
25-
"k8s.io/klog"
25+
"k8s.io/klog/v2"
2626
)
2727

2828
func (d *deployer) deleteResourceGroup(subscriptionID string, credential azcore.TokenCredential) error {
29-
klog.Infof("Deleting resource group %q", d.ResourceGroupName)
29+
logger := klog.Background().WithName("deleteResourceGroup")
30+
logger.Info("Deleting resource group", "resourceGroup", d.ResourceGroupName)
3031
rgClient, _ := armresources.NewResourceGroupsClient(subscriptionID, credential, nil)
3132

3233
poller, err := rgClient.BeginDelete(ctx, d.ResourceGroupName, nil)
@@ -40,6 +41,7 @@ func (d *deployer) deleteResourceGroup(subscriptionID string, credential azcore.
4041
}
4142

4243
func (d *deployer) Down() error {
44+
logger := klog.Background().WithName("Down")
4345
// Create a credentials object.
4446
cred, err := azidentity.NewDefaultAzureCredential(nil)
4547
if err != nil {
@@ -51,6 +53,6 @@ func (d *deployer) Down() error {
5153
klog.Fatalf("failed to delete resource group %q: %v", d.ResourceGroupName, err)
5254
}
5355

54-
klog.Infof("Resource group %q deleted", d.ResourceGroupName)
56+
logger.Info("Resource group deleted", "resourceGroup", d.ResourceGroupName)
5557
return nil
5658
}

kubetest2-aks/deployer/up.go

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ import (
3636
armcontainerservicev2 "github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/containerservice/armcontainerservice/v2"
3737
"github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources"
3838
"k8s.io/apimachinery/pkg/util/wait"
39-
"k8s.io/klog"
39+
"k8s.io/klog/v2"
4040
"k8s.io/utils/ptr"
4141

4242
"sigs.k8s.io/kubetest2/pkg/exec"
@@ -210,6 +210,7 @@ func (d *deployer) prepareCustomConfig() ([]byte, error) {
210210

211211
// prepareClusterConfig generates cluster config.
212212
func (d *deployer) prepareClusterConfig(clusterID string) (*armcontainerservicev2.ManagedCluster, string, error) {
213+
logger := klog.Background().WithName("prepareClusterConfig")
213214
configFile, err := openPath(d.ConfigPath)
214215
if err != nil {
215216
return nil, "", fmt.Errorf("failed to read cluster config file at %q: %v", d.ConfigPath, err)
@@ -230,12 +231,12 @@ func (d *deployer) prepareClusterConfig(clusterID string) (*armcontainerservicev
230231
return nil, "", fmt.Errorf("failed to prepare custom config: %v", err)
231232
}
232233

233-
klog.Infof("Customized configurations are: %s", string(customConfig))
234+
logger.Info("Customized configurations", "config", string(customConfig))
234235

235236
encodedCustomConfig := base64.StdEncoding.EncodeToString(customConfig)
236237
clusterConfig = strings.ReplaceAll(clusterConfig, "{CUSTOM_CONFIG}", encodedCustomConfig)
237238

238-
klog.Infof("AKS cluster config without credential: %s", clusterConfig)
239+
logger.Info("AKS cluster config without credential", "config", clusterConfig)
239240

240241
mcConfig := &armcontainerservicev2.ManagedCluster{}
241242
err = json.Unmarshal([]byte(clusterConfig), mcConfig)
@@ -248,10 +249,11 @@ func (d *deployer) prepareClusterConfig(clusterID string) (*armcontainerservicev
248249
}
249250

250251
func updateAzureCredential(mcConfig *armcontainerservicev2.ManagedCluster) {
251-
klog.Infof("Updating Azure credentials to manage cluster resource group")
252+
logger := klog.Background().WithName("updateAzureCredential")
253+
logger.Info("Updating Azure credentials to manage cluster resource group")
252254

253255
if len(clientID) != 0 && len(clientSecret) != 0 {
254-
klog.Infof("Service principal is used to manage cluster resource group")
256+
logger.Info("Service principal is used to manage cluster resource group")
255257
// Reset `Identity` in case managed identity is defined in templates while service principal is used.
256258
mcConfig.Identity = nil
257259
mcConfig.Properties.ServicePrincipalProfile = &armcontainerservicev2.ManagedClusterServicePrincipalProfile{
@@ -262,7 +264,7 @@ func updateAzureCredential(mcConfig *armcontainerservicev2.ManagedCluster) {
262264
}
263265
// Managed identity is preferable over service principal and picked by default when creating an AKS cluster.
264266
// TODO(mainred): we can consider supporting user-assigned managed identity.
265-
klog.Infof("System assigned managed identity is used to manage cluster resource group")
267+
logger.Info("System assigned managed identity is used to manage cluster resource group")
266268
// Reset `ServicePrincipalProfile` in case service principal is defined in templates while managed identity is used.
267269
mcConfig.Properties.ServicePrincipalProfile = nil
268270
systemAssignedIdentity := armcontainerservicev2.ResourceIdentityTypeSystemAssigned
@@ -273,7 +275,8 @@ func updateAzureCredential(mcConfig *armcontainerservicev2.ManagedCluster) {
273275

274276
// createAKSWithCustomConfig creates an AKS cluster with custom configuration.
275277
func (d *deployer) createAKSWithCustomConfig() error {
276-
klog.Infof("Creating the AKS cluster with custom config")
278+
logger := klog.Background().WithName("createAKSWithCustomConfig")
279+
logger.Info("Creating the AKS cluster with custom config")
277280
clusterID := fmt.Sprintf("/subscriptions/%s/resourcegroups/%s/providers/Microsoft.ContainerService/managedClusters/%s", subscriptionID, d.ResourceGroupName, d.ClusterName)
278281

279282
mcConfig, encodedCustomConfig, err := d.prepareClusterConfig(clusterID)
@@ -307,13 +310,14 @@ func (d *deployer) createAKSWithCustomConfig() error {
307310
return fmt.Errorf("failed to put resource: %v", err.Error())
308311
}
309312

310-
klog.Infof("An AKS cluster %q in resource group %q is created", d.ClusterName, d.ResourceGroupName)
313+
logger.Info("An AKS cluster is created", "clusterName", d.ClusterName, "resourceGroup", d.ResourceGroupName)
311314
return nil
312315
}
313316

314317
// getAKSKubeconfig gets kubeconfig of the AKS cluster and writes it to specific path.
315318
func (d *deployer) getAKSKubeconfig() error {
316-
klog.Infof("Retrieving AKS cluster's kubeconfig")
319+
logger := klog.Background().WithName("getAKSKubeconfig")
320+
logger.Info("Retrieving AKS cluster's kubeconfig")
317321
client, err := armcontainerservicev2.NewManagedClustersClient(subscriptionID, cred, nil)
318322
if err != nil {
319323
return fmt.Errorf("failed to new managed cluster client with sub ID %q: %v", subscriptionID, err)
@@ -324,7 +328,7 @@ func (d *deployer) getAKSKubeconfig() error {
324328
resp, err = client.ListClusterUserCredentials(ctx, d.ResourceGroupName, d.ClusterName, nil)
325329
if err != nil {
326330
if strings.Contains(err.Error(), "404 Not Found") {
327-
klog.Infof("failed to list cluster user credentials for 1 minute, retrying")
331+
logger.Info("failed to list cluster user credentials for 1 minute, retrying")
328332
return false, nil
329333
}
330334
return false, fmt.Errorf("failed to list cluster user credentials with resource group name %q, cluster ID %q: %v", d.ResourceGroupName, d.ClusterName, err)
@@ -349,7 +353,7 @@ func (d *deployer) getAKSKubeconfig() error {
349353
return fmt.Errorf("failed to write kubeconfig to %s", destPath)
350354
}
351355

352-
klog.Infof("Succeeded in getting kubeconfig of cluster %q in resource group %q", d.ClusterName, d.ResourceGroupName)
356+
logger.Info("Succeeded in getting kubeconfig of cluster", "clusterName", d.ClusterName, "resourceGroup", d.ResourceGroupName)
353357
return nil
354358
}
355359

@@ -380,6 +384,7 @@ func (d *deployer) verifyUpFlags() error {
380384
}
381385

382386
func (d *deployer) Up() error {
387+
logger := klog.Background().WithName("Up")
383388
if err := d.verifyUpFlags(); err != nil {
384389
return fmt.Errorf("up flags are invalid: %v", err)
385390
}
@@ -389,7 +394,7 @@ func (d *deployer) Up() error {
389394
if err != nil {
390395
return fmt.Errorf("failed to create the resource group: %v", err)
391396
}
392-
klog.Infof("Resource group %s created", *resourceGroup.ResourceGroup.ID)
397+
logger.Info("Resource group created", "resourceGroupID", *resourceGroup.ResourceGroup.ID)
393398

394399
// Create the AKS cluster
395400
if err := d.createAKSWithCustomConfig(); err != nil {

pkg/azclient/policy/retryaftermin/retryaftermin.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ import (
2323
"time"
2424

2525
"github.com/Azure/azure-sdk-for-go/sdk/azcore/policy"
26+
2627
"k8s.io/klog/v2"
2728
)
2829

@@ -45,6 +46,7 @@ func (p *Policy) GetMinRetryAfter() time.Duration {
4546

4647
// Do implements the policy.Policy interface
4748
func (p *Policy) Do(req *policy.Request) (*http.Response, error) {
49+
logger := klog.Background().WithName("Do")
4850
resp, err := req.Next()
4951
// If the request failed or the status code is >= 300, return
5052
if err != nil || resp == nil || resp.StatusCode >= 300 {
@@ -54,7 +56,7 @@ func (p *Policy) Do(req *policy.Request) (*http.Response, error) {
5456
// Check if the response retry-after header is less than the minimum
5557
overrideRetryAfter := func(header http.Header, headerName string, retryAfter time.Duration) {
5658
if retryAfter < p.minRetryAfter {
57-
klog.V(5).Infof("RetryAfterMinPolicy: retry-after value %s is less than minimum %s, removing retry-after header..", retryAfter, p.minRetryAfter)
59+
logger.V(5).Info("RetryAfterMinPolicy: retry-after value is less than minimum, removing retry-after header", "retryAfter", retryAfter, "minimum", p.minRetryAfter)
5860
header.Del(headerName)
5961
}
6062
}
@@ -76,7 +78,7 @@ func (p *Policy) Do(req *policy.Request) (*http.Response, error) {
7678
// If the retry-after value is less than the minimum, remove it
7779
overrideRetryAfter(resp.Header, headerName, retryDuration)
7880
} else {
79-
klog.V(5).Infof("RetryAfterMinPolicy: not modifying %s header with unrecognized format: %s", headerName, retryAfter)
81+
logger.V(5).Info("RetryAfterMinPolicy: not modifying header with unrecognized format", "headerName", headerName, "unrecognized format", retryAfter)
8082
}
8183
}
8284
}

pkg/credentialprovider/azure_acr_helper.go

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,8 @@ import (
5858
"unicode"
5959

6060
utilnet "k8s.io/apimachinery/pkg/util/net"
61-
"k8s.io/klog/v2"
61+
62+
"sigs.k8s.io/cloud-provider-azure/pkg/log"
6263
)
6364

6465
const (
@@ -144,6 +145,7 @@ func performTokenExchange(
144145
directive *authDirective,
145146
tenant string,
146147
accessToken string) (string, error) {
148+
logger := log.Background().WithName("performTokenExchange")
147149
var err error
148150
data := url.Values{
149151
"service": []string{directive.service},
@@ -176,7 +178,7 @@ func performTokenExchange(
176178

177179
if exchange.Header != nil {
178180
if correlationID, ok := exchange.Header["X-Ms-Correlation-Request-Id"]; ok {
179-
klog.V(4).Infof("correlationID: %s", correlationID)
181+
logger.V(4).Info("", "correlationID", correlationID)
180182
}
181183
}
182184

0 commit comments

Comments
 (0)