From 361fdfac3f477936e42fdadb369a6c3ecd959601 Mon Sep 17 00:00:00 2001 From: James Munnelly Date: Mon, 16 Dec 2019 16:31:18 +0000 Subject: [PATCH] Don't log misleading error messages Signed-off-by: James Munnelly --- pkg/util/kube/BUILD.bazel | 1 - pkg/util/kube/pki.go | 30 ------------------------------ 2 files changed, 31 deletions(-) diff --git a/pkg/util/kube/BUILD.bazel b/pkg/util/kube/BUILD.bazel index edbf3bda8..82d8aac83 100644 --- a/pkg/util/kube/BUILD.bazel +++ b/pkg/util/kube/BUILD.bazel @@ -6,7 +6,6 @@ go_library( importpath = "github.com/jetstack/cert-manager/pkg/util/kube", visibility = ["//visibility:public"], deps = [ - "//pkg/logs:go_default_library", "//pkg/util/errors:go_default_library", "//pkg/util/pki:go_default_library", "@io_k8s_api//core/v1:go_default_library", diff --git a/pkg/util/kube/pki.go b/pkg/util/kube/pki.go index 0f60bb721..101804780 100644 --- a/pkg/util/kube/pki.go +++ b/pkg/util/kube/pki.go @@ -24,7 +24,6 @@ import ( api "k8s.io/api/core/v1" corelisters "k8s.io/client-go/listers/core/v1" - logf "github.com/jetstack/cert-manager/pkg/logs" "github.com/jetstack/cert-manager/pkg/util/errors" "github.com/jetstack/cert-manager/pkg/util/pki" ) @@ -33,26 +32,17 @@ import ( // secret with 'name' in 'namespace'. It will read the private key data from the secret // entry with name 'keyName'. func SecretTLSKeyRef(ctx context.Context, secretLister corelisters.SecretLister, namespace, name, keyName string) (crypto.Signer, error) { - log := logf.FromContext(ctx) - log = logf.WithRelatedResourceName(log, name, namespace, "Secret") - secret, err := secretLister.Secrets(namespace).Get(name) if err != nil { - log.Error(err, "failed to retrieve secret") return nil, err } - log = logf.WithRelatedResource(log, secret) - log.V(logf.DebugLevel).Info("got secret resource") - log = log.WithValues("secret_key", keyName) keyBytes, ok := secret.Data[keyName] if !ok { - log.Error(nil, "no data for key in secret") return nil, errors.NewInvalidData("no data for %q in secret '%s/%s'", keyName, namespace, name) } key, err := pki.DecodePrivateKeyBytes(keyBytes) if err != nil { - log.Error(err, "error decoding private key") return key, errors.NewInvalidData(err.Error()) } @@ -67,28 +57,18 @@ func SecretTLSKey(ctx context.Context, secretLister corelisters.SecretLister, na } func SecretTLSCertChain(ctx context.Context, secretLister corelisters.SecretLister, namespace, name string) ([]*x509.Certificate, error) { - log := logf.FromContext(ctx) - log = logf.WithRelatedResourceName(log, name, namespace, "Secret") - secret, err := secretLister.Secrets(namespace).Get(name) if err != nil { - log.Error(err, "failed to retrieve secret") return nil, err } - log = logf.WithRelatedResource(log, secret) - log.V(logf.DebugLevel).Info("got secret resource") - log = log.WithValues("secret_key", api.TLSCertKey) certBytes, ok := secret.Data[api.TLSCertKey] if !ok { - log.Error(nil, "no data for key in secret") return nil, errors.NewInvalidData("no data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) } - log.V(logf.DebugLevel).Info("attempting to decode certificate chain") cert, err := pki.DecodeX509CertificateChainBytes(certBytes) if err != nil { - log.Error(err, "error decoding x509 certificate") return cert, errors.NewInvalidData(err.Error()) } @@ -96,36 +76,26 @@ func SecretTLSCertChain(ctx context.Context, secretLister corelisters.SecretList } func SecretTLSKeyPair(ctx context.Context, secretLister corelisters.SecretLister, namespace, name string) ([]*x509.Certificate, crypto.Signer, error) { - log := logf.FromContext(ctx) - log = logf.WithRelatedResourceName(log, name, namespace, "Secret") - secret, err := secretLister.Secrets(namespace).Get(name) if err != nil { return nil, nil, err } - log = logf.WithRelatedResource(log, secret) - log = log.WithValues("secret_key", api.TLSPrivateKeyKey) keyBytes, ok := secret.Data[api.TLSPrivateKeyKey] if !ok { - log.Error(nil, "no data for key in secret") return nil, nil, errors.NewInvalidData("no private key data for %q in secret '%s/%s'", api.TLSPrivateKeyKey, namespace, name) } key, err := pki.DecodePrivateKeyBytes(keyBytes) if err != nil { - log.Error(err, "error decoding private key") return nil, nil, errors.NewInvalidData(err.Error()) } - log = log.WithValues("secret_key", api.TLSCertKey) certBytes, ok := secret.Data[api.TLSCertKey] if !ok { - log.Error(nil, "no data for key in secret") return nil, key, errors.NewInvalidData("no certificate data for %q in secret '%s/%s'", api.TLSCertKey, namespace, name) } cert, err := pki.DecodeX509CertificateChainBytes(certBytes) if err != nil { - log.Error(err, "error decoding x509 certificate") return nil, key, errors.NewInvalidData(err.Error()) }