From 41c56e467fa401c07de254a42f5da4dca662b1c8 Mon Sep 17 00:00:00 2001 From: OZGCloud <ozgcloud@mgm-tp.com> Date: Tue, 8 Aug 2023 12:49:55 +0200 Subject: [PATCH] OZG-3961 add logging --- .../operator/keycloak/user/KeycloakUserRemoteService.java | 6 ++++++ .../operator/keycloak/user/KeycloakUserService.java | 1 + 2 files changed, 7 insertions(+) diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java index 86cbf0d..5c3f485 100644 --- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java +++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserRemoteService.java @@ -120,9 +120,12 @@ class KeycloakUserRemoteService { } public boolean existSecret(OzgKeycloakUserSpec userSpec, String createdNamespace) { + log.log(Level.INFO, "existSecret..."); var namespace = "keycloak";// TODO durch den namespace ersetzen, wenn die Helm Charts passen + log.log(Level.INFO, "for user: " + userSpec.getKeycloakUser().getUsername() + " and namespace: " + namespace); var secret = getUserSecret(userSpec, namespace); + log.log(Level.INFO, "Found Secret: " + secret.get()); return Objects.nonNull(secret.get()); } @@ -177,6 +180,7 @@ class KeycloakUserRemoteService { var namespace = "keycloak";// TODO durch den namespace ersetzen, wenn die Helm Charts passen var secretName = buildCredentialSecretName(userSpec.getKeycloakUser()); + log.log(Level.INFO, "Get User secret: " + secretName); return getUserSecret(secretName, namespace); } @@ -185,6 +189,8 @@ class KeycloakUserRemoteService { } private Resource<Secret> getUserSecret(String secretName, String namespace) { + log.log(Level.INFO, "Get secret by name: " + secretName); + log.log(Level.INFO, "Get secret in namespace: " + namespace); return kubernetesClient.secrets().inNamespace(namespace).withName(secretName); } diff --git a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java index a25b97b..dc9223f 100644 --- a/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java +++ b/src/main/java/de/ozgcloud/operator/keycloak/user/KeycloakUserService.java @@ -48,6 +48,7 @@ class KeycloakUserService { log.log(Level.INFO, "Secret not exists -> create one"); remoteService.createSecret(userSpec, namespace); } + log.log(Level.INFO, "Secret exists, set password"); var password = remoteService.getPasswordFromSecret(userSpec, namespace); log.log(Level.INFO, "Update password to: " + password); userSpec.getKeycloakUser().setPassword(password); -- GitLab