liuhaifeng vor 4 Jahren
Ursprung
Commit
98507420a3
2 geänderte Dateien mit 3 neuen und 3 gelöschten Zeilen
  1. 2 2
      backend/awsvpc/awsvpc.go
  2. 1 1
      backend/ipsec/handle_xfrm.go

+ 2 - 2
backend/awsvpc/awsvpc.go

@@ -60,7 +60,7 @@ func (conf *backendConfig) routeTables() ([]string, error) {
 		return []string{table}, nil
 	}
 	if rawTables, ok := conf.RouteTableID.([]interface{}); ok {
-		log.Info("RouteTableID configured as slice: %+v", rawTables)
+		log.Infof("RouteTableID configured as slice: %+v", rawTables)
 		tables := make([]string, len(rawTables))
 		for idx, t := range rawTables {
 			table, ok := t.(string)
@@ -85,7 +85,7 @@ func (be *AwsVpcBackend) RegisterNetwork(ctx context.Context, wg *sync.WaitGroup
 	var cfg backendConfig
 
 	if len(config.Backend) > 0 {
-		log.Info("Backend configured as: %s", string(config.Backend))
+		log.Infof("Backend configured as: %s", string(config.Backend))
 		if err := json.Unmarshal(config.Backend, &cfg); err != nil {
 			return nil, fmt.Errorf("error decoding VPC backend config: %v", err)
 		}

+ 1 - 1
backend/ipsec/handle_xfrm.go

@@ -61,7 +61,7 @@ func AddXFRMPolicy(myLease, remoteLease *subnet.Lease, dir netlink.Dir, reqID in
 			return fmt.Errorf("error getting policy: %+v err: %v", policy, err)
 		}
 	} else {
-		log.Info("Updating ipsec policy %+v with %+v", existingPolicy, policy)
+		log.Infof("Updating ipsec policy %+v with %+v", existingPolicy, policy)
 		if err := netlink.XfrmPolicyUpdate(policy); err != nil {
 			return fmt.Errorf("error updating policy: %+v err: %v", policy, err)
 		}