Skip to content
This repository was archived by the owner on Mar 21, 2025. It is now read-only.

Commit 8e69e9e

Browse files
author
Michael Sauter
committed
Fix log message output
1 parent 77663e6 commit 8e69e9e

File tree

1 file changed

+24
-23
lines changed

1 file changed

+24
-23
lines changed

internal/manager/server.go

Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -160,26 +160,27 @@ func NewServer(serverConfig ServerConfig) (*Server, error) {
160160
func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
161161

162162
requestID := randStringBytes(6)
163-
s.Logger.Infof(requestID, "---START---")
163+
s.Logger.Infof("%s ---START---", requestID)
164164

165165
body, err := ioutil.ReadAll(r.Body)
166166
if err != nil {
167-
s.Logger.Errorf(requestID, err.Error())
168-
http.Error(w, "could not read body", http.StatusInternalServerError)
167+
msg := "could not read body"
168+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
169+
http.Error(w, msg, http.StatusInternalServerError)
169170
return
170171
}
171172

172173
if err := validatePayload(r.Header, body, []byte(s.WebhookSecret)); err != nil {
173174
msg := "failed to validate incoming request"
174-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
175+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
175176
http.Error(w, msg, http.StatusBadRequest)
176177
return
177178
}
178179

179180
req := &requestBitbucket{}
180181
if err := json.Unmarshal(body, &req); err != nil {
181182
msg := fmt.Sprintf("cannot parse JSON: %s", err)
182-
s.Logger.Errorf(requestID, msg)
183+
s.Logger.Errorf("%s %s", requestID, msg)
183184
http.Error(w, msg, http.StatusBadRequest)
184185
return
185186
}
@@ -208,7 +209,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
208209
change.Ref.Type,
209210
allowedChangeRefType,
210211
)
211-
s.Logger.Warnf(requestID, msg)
212+
s.Logger.Warnf("%s %s", requestID, msg)
212213
// According to MDN (https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/418),
213214
// "some websites use this response for requests they do not wish to handle [...]".
214215
http.Error(w, msg, http.StatusTeapot)
@@ -230,7 +231,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
230231
commitSHA = req.PullRequest.FromRef.LatestCommit
231232
} else {
232233
msg := fmt.Sprintf("Unsupported event key: %s", req.EventKey)
233-
s.Logger.Warnf(requestID, msg)
234+
s.Logger.Warnf("%s %s", requestID, msg)
234235
http.Error(w, msg, http.StatusBadRequest)
235236
return
236237
}
@@ -266,7 +267,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
266267
csha, err := getCommitSHA(s.BitbucketClient, pData.Project, pData.Repository, pData.GitFullRef)
267268
if err != nil {
268269
msg := "could not get commit SHA"
269-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
270+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
270271
http.Error(w, msg, http.StatusInternalServerError)
271272
return
272273
}
@@ -277,7 +278,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
277278
skip := shouldSkip(s.BitbucketClient, pData.Project, pData.Repository, commitSHA)
278279
if skip {
279280
msg := "Commit should be skipped"
280-
s.Logger.Infof(requestID, fmt.Sprintf("%s: %s", msg, err))
281+
s.Logger.Infof("%s %s: %s", requestID, msg, err)
281282
// According to MDN (https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/418),
282283
// "some websites use this response for requests they do not wish to handle [..]".
283284
http.Error(w, msg, http.StatusTeapot)
@@ -286,7 +287,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
286287
prInfo, err := extractPullRequestInfo(s.BitbucketClient, pData.Project, pData.Repository, commitSHA)
287288
if err != nil {
288289
msg := "Could not extract PR info"
289-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
290+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
290291
http.Error(w, msg, http.StatusInternalServerError)
291292
return
292293
}
@@ -302,7 +303,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
302303

303304
if err != nil {
304305
msg := fmt.Sprintf("could not download ODS config for repo %s", pData.Repository)
305-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
306+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
306307
http.Error(w, msg, http.StatusInternalServerError)
307308
return
308309
}
@@ -313,7 +314,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
313314
env, err := odsConfig.Environment(pData.Environment)
314315
if err != nil {
315316
msg := fmt.Sprintf("environment misconfiguration: %s", err)
316-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
317+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
317318
http.Error(w, msg, http.StatusInternalServerError)
318319
return
319320
}
@@ -328,7 +329,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
328329
_, err := s.TektonClient.CreatePipeline(r.Context(), newPipeline, metav1.CreateOptions{})
329330
if err != nil {
330331
msg := fmt.Sprintf("cannot create pipeline %s", newPipeline.Name)
331-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
332+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
332333
http.Error(w, msg, http.StatusInternalServerError)
333334
return
334335
}
@@ -337,7 +338,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
337338
_, err := s.TektonClient.UpdatePipeline(r.Context(), newPipeline, metav1.UpdateOptions{})
338339
if err != nil {
339340
msg := fmt.Sprintf("cannot update pipeline %s", newPipeline.Name)
340-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
341+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
341342
http.Error(w, msg, http.StatusInternalServerError)
342343
return
343344
}
@@ -347,7 +348,7 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
347348
err = s.createPVCIfRequired(r.Context(), pData)
348349
if err != nil {
349350
msg := "cannot create workspace PVC"
350-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
351+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
351352
http.Error(w, msg, http.StatusInternalServerError)
352353
return
353354
}
@@ -356,45 +357,45 @@ func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) {
356357
// parallel pipeline runs.
357358
s.Mutex.Lock()
358359
defer s.Mutex.Unlock()
359-
s.Logger.Infof(requestID, fmt.Sprintf("Starting pruning of pipeline runs related to repository %s ...", pData.Repository))
360+
s.Logger.Infof("%s Starting pruning of pipeline runs related to repository %s ...", requestID, pData.Repository)
360361
ctxt, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
361362
defer cancel()
362363
pipelineRuns, err := listPipelineRuns(s.TektonClient, ctxt, pData.Repository)
363364
if err != nil {
364365
msg := "could not retrieve existing pipeline runs"
365-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
366+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
366367
http.Error(w, msg, http.StatusInternalServerError)
367368
return
368369
}
369-
s.Logger.Debugf(requestID, fmt.Sprintf("Found %d pipeline runs related to repository %s.", len(pipelineRuns.Items), pData.Repository))
370+
s.Logger.Debugf("%s Found %d pipeline runs related to repository %s.", requestID, len(pipelineRuns.Items), pData.Repository)
370371

371372
if s.PipelineRunPruner != nil {
372373
go func() {
373374
ctxt, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
374375
defer cancel()
375376
err = s.PipelineRunPruner.Prune(ctxt, pipelineRuns.Items)
376377
if err != nil {
377-
s.Logger.Warnf(fmt.Sprintf(
378+
s.Logger.Warnf(
378379
"Pruning pipeline runs of repository %s failed: %s",
379380
pData.Repository, err,
380-
))
381+
)
381382
}
382383
}()
383384
}
384385

385-
s.Logger.Infof(requestID, fmt.Sprintf("%+v", pData))
386+
s.Logger.Infof("%s %+v", requestID, pData)
386387

387388
_, err = createPipelineRun(s.TektonClient, r.Context(), pData)
388389
if err != nil {
389390
msg := "cannot create pipeline run"
390-
s.Logger.Errorf(requestID, fmt.Sprintf("%s: %s", msg, err))
391+
s.Logger.Errorf("%s %s: %s", requestID, msg, err)
391392
http.Error(w, msg, http.StatusInternalServerError)
392393
return
393394
}
394395

395396
err = json.NewEncoder(w).Encode(pData)
396397
if err != nil {
397-
s.Logger.Errorf(requestID, fmt.Sprintf("cannot write body: %s", err))
398+
s.Logger.Errorf("%s cannot write body: %s", requestID, err)
398399
return
399400
}
400401
}

0 commit comments

Comments
 (0)