From 41c56e467fa401c07de254a42f5da4dca662b1c8 Mon Sep 17 00:00:00 2001
From: OZGCloud <ozgcloud@mgm-tp.com>
Date: Tue, 8 Aug 2023 12:49:55 +0200
Subject: [PATCH] OZG-3961 add logging

---
 .../operator/keycloak/user/KeycloakUserRemoteService.java   | 6 ++++++
 .../operator/keycloak/user/KeycloakUserService.java         | 1 +
 2 files changed, 7 insertions(+)

diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
index 86cbf0d..5c3f485 100644
--- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
+++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java
@@ -120,9 +120,12 @@ class KeycloakUserRemoteService {
 	}
 
 	public boolean existSecret(OzgKeycloakUserSpec userSpec, String createdNamespace) {
+		log.log(Level.INFO, "existSecret...");
 		var namespace = "keycloak";// TODO durch den namespace ersetzen, wenn die Helm Charts passen
+		log.log(Level.INFO, "for user: " + userSpec.getKeycloakUser().getUsername() + " and namespace: " + namespace);
 		var secret = getUserSecret(userSpec, namespace);
 
+		log.log(Level.INFO, "Found Secret: " + secret.get());
 		return Objects.nonNull(secret.get());
 	}
 
@@ -177,6 +180,7 @@ class KeycloakUserRemoteService {
 		var namespace = "keycloak";// TODO durch den namespace ersetzen, wenn die Helm Charts passen
 
 		var secretName = buildCredentialSecretName(userSpec.getKeycloakUser());
+		log.log(Level.INFO, "Get User secret: " + secretName);
 		return getUserSecret(secretName, namespace);
 	}
 
@@ -185,6 +189,8 @@ class KeycloakUserRemoteService {
 	}
 
 	private Resource<Secret> getUserSecret(String secretName, String namespace) {
+		log.log(Level.INFO, "Get secret by name: " + secretName);
+		log.log(Level.INFO, "Get secret in namespace: " + namespace);
 		return kubernetesClient.secrets().inNamespace(namespace).withName(secretName);
 	}
 
diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java
index a25b97b..dc9223f 100644
--- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java
+++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java
@@ -48,6 +48,7 @@ class KeycloakUserService {
 			log.log(Level.INFO, "Secret not exists -> create one");
 			remoteService.createSecret(userSpec, namespace);
 		}
+		log.log(Level.INFO, "Secret exists, set password");
 		var password = remoteService.getPasswordFromSecret(userSpec, namespace);
 		log.log(Level.INFO, "Update password to: " + password);
 		userSpec.getKeycloakUser().setPassword(password);
-- 
GitLab